main
GreySec Red Team Tools
Documentation and operational notes for red team tooling used in GreySec engagements.
Core C2 Framework
| Tool | Purpose | Key Modules |
|---|---|---|
| Metasploit | Exploitation, pivoting | meterpreter, shell sessions |
| Covenant | .NET C2 | Grunt, pivot listeners |
| Sliver | golang C2 | beacons, session management |
Network Reconnaissance
| Tool | Purpose |
|---|---|
| nmap | Port scanning, service detection |
| BloodHound | AD enumeration |
| CrackMapExec | Network pentest automation |
Credential Attacks
| Tool | Purpose |
|---|---|
| Hashcat | Password cracking |
| John | Credential attacks |
| mimikatz | LSASS, credential extraction |
Lateral Movement
| Tool | Purpose |
|---|---|
| Impacket | SMB, WMI, DCOM execution |
| Evil-WinRM | WinRM shell access |
| psexec.py | Remote service execution |
Persistence
| Tool | Purpose |
|---|---|
| CrackMapExec | Admin persistence |
| mimikatz | Credential dumping |
| WCE | Windows credential editor |
Exfiltration
| Tool | Purpose |
|---|---|
| Cobalt Strike | Data exfiltration |
| DNS-over-HTTPS tunnel | Covert exfil |
| Staged payloads | Encrypted channels |
Operational Security
- All tools must be run through a redirector (nginx/apache)
- Use compromised infrastructure when possible
- OPSEC-check before every action
Setup
See individual tool directories for installation and configuration.
Description
Languages
Markdown
100%