A comprehensive modern architecture model is proposed to integrate platform solutions and tooling to support a professional Red Team.
| Reference | Description |
|---|---|
| Red Team GitLab Handbook | GitLab's open-source Red Team operations handbook covering methodology, processes, tooling, and best practices for conducting enterprise-level adversarial engagements. |
| IBM Red teaming | IBM's overview of red teaming methodology, adversary simulation approaches, and how organizations can leverage offensive security testing to strengthen defenses. |
| Red Team | Community-driven platform aggregating red team tools, techniques, resources, and knowledge sharing for offensive security professionals. |
| Certificates/Courses | Description |
|---|---|
| Red Team Ops I & II | In-depth hands-on course teaching advanced adversary simulation using Cobalt Strike, covering OPSEC-safe tradecraft, lateral movement, privilege escalation, and evasion techniques. |
| BOF Development & Tradecraft | Specialized course teaching Beacon Object File (BOF) development for Cobalt Strike, enabling custom in-memory capabilities without dropping artifacts to disk. |
| OSCP+ | OffSec's foundational penetration testing certification teaching practical exploitation, enumeration, privilege escalation, and report writing through hands-on lab environment. |
| OSEP | Advanced evasion techniques and breaching defenses certification covering AV/EDR bypass, lateral movement in hardened environments, and custom payload development. |
| OSWE | Advanced web application security certification focusing on white-box code review, exploiting custom web applications, and developing proof-of-concept exploits. |
| OSED | Windows exploit development certification teaching buffer overflows, shellcoding, reverse engineering, and advanced exploitation techniques on x86 and x64 architectures. |
| OSEE | Expert-level exploit development course covering advanced Windows internals, kernel exploitation, sandbox escapes, and cutting-edge offensive research techniques. |
| Malware Development Course | Comprehensive course teaching malware creation from scratch using C/C++, covering process injection, EDR evasion, custom loaders, shellcode execution, and obfuscation. |
| Ransomware Internals, Simulation & Detection Course | Deep dive into ransomware mechanics, encryption techniques, propagation methods, and how to safely simulate ransomware operations for red team exercises. |
| Offensive Phishing Operations Course | Practical course on planning and executing sophisticated phishing campaigns, including infrastructure setup, payload development, and credential harvesting techniques. |
| Modern Initial Access and Evasion Tactics | Course covering contemporary initial access vectors, living-off-the-land techniques, AMSI/ETW bypasses, and blending into target environments undetected. |
| Red Teaming (TryHackMe) | Interactive learning path covering red team fundamentals, network exploitation, Active Directory attacks, C2 frameworks, and adversarial emulation methodologies. |
| Phishlet Developer Masterclass | Hands-on course teaching how to create custom Evilginx phishlets for various web applications to bypass MFA through man-in-the-middle session hijacking. |
| EvilGoPhish Mastery | Complete guide to deploying and operating EvilGoPhish combining GoPhish's campaign management with Evilginx's MFA bypass capabilities. |
| Evilginx Professional Masterclass | Professional-level course on Evilginx deployment, infrastructure hardening, phishlet customization, and executing advanced credential harvesting operations. |
| AI Agent/MCP App/Rules | Description |
|---|---|
| Cursor | AI-powered code editor that provides contextual code generation, intelligent autocomplete, and natural-language editing to accelerate exploit and tool development. |
| Claude | Anthropic’s advanced AI assistant designed for safe, helpful, and reliable assistance, capable of code analysis, explanation, threat modeling, and documentation. |
| Windsurf | AI coding assistant offering full-repository understanding, intelligent code completion, AI pair-programming chat, and enterprise-grade security to boost developer productivity. |
| Antigravity | AI agent specialized in software development workflows, offering intelligent code completion, refactoring suggestions, and automated testing capabilities. |
| Continue.dev | Open-source AI code assistant supporting multiple LLMs, providing autocomplete, code explanations, and customizable prompts directly within the IDE. |
| HexStrike AI | Advanced MCP server that enables AI agents (Claude, GPT, Copilot, etc.) to autonomously run over 150 cybersecurity tools for automated pentesting, vulnerability discovery, bug‑bounty automation, and security research, bridging LLMs with real‑world offensive capabilities. |
| Cursor Best Practices | Repository of best‑practice guidelines and rules for using Cursor to maximize code generation, refactoring, and automated testing efficiency. |
| awesome-cursorrules | Curated collection of useful Cursor rules for code generation, refactoring, and testing. |
| Shannon | Fully autonomous AI pentester that discovers real exploits in web applications, achieving a 96.15 % success rate on the hint‑free XBOW benchmark; it automates scanning, vulnerability identification, and exploit generation. |
| CS-MCP | MCP server implementation for Cobalt Strike (based on version 4.12), providing a programmable interface to control Cobalt Strike via the MCP protocol for automation and AI‑agent integration. |
| LLM Server | Description |
|---|---|
| OpenAI | Leading AI research organization providing GPT models through API for natural language processing, code generation, and complex reasoning tasks. |
| huggingface | Open platform hosting thousands of pre-trained models, datasets, and tools for NLP, computer vision, and machine learning experimentation. |
| DeepTeam | AI-powered platform specialized for security teams, offering threat intelligence analysis, report generation, and collaborative security research capabilities. |
| PentestAgent | AI-powered platform specialized for security teams, offering threat intelligence analysis, report generation, and collaborative security research capabilities. |
| OSINT Platform | Description |
|---|---|
| rengine | Automated reconnaissance framework with GPT-powered vulnerability analysis, continuous monitoring, subdomain discovery, endpoint extraction, and comprehensive reporting. |
| bbot | Recursive OSINT automation tool finding 20-50% more subdomains through AI/NLP-powered mutations, passive API enumeration, and intelligent DNS brute-forcing. |
| Data Leak | Description |
|---|---|
| Group-IB | Search engine for identifying exposed databases, credentials, and sensitive information from historical breaches for threat intelligence and exposure assessment. |
| IntelX | Search engine for identifying exposed databases, credentials, and sensitive information from historical breaches for threat intelligence and exposure assessment. |
| Search Engine | Description |
|---|---|
| Shodan | Internet-wide scanner indexing exposed devices, services, and vulnerabilities across global IP space for attack surface discovery and threat intelligence. |
| ZoomEye | Cyberspace search engine providing device fingerprinting, service detection, and vulnerability mapping across internet-connected systems. |
| Censys | Internet scanning platform offering comprehensive visibility into exposed assets, certificates, and infrastructure for attack surface management. |
| ViewDNS.info | Collection of DNS and networking tools providing reverse IP lookup, DNS records, port scanning, and historical DNS data. |
| DNSDumpster | Free domain research tool for discovering DNS records, subdomains, and mapping organizational infrastructure through passive reconnaissance. |
| Sourcegraph | Universal code search engine enabling rapid discovery of code patterns, vulnerabilities, and sensitive data across public and private repositories. |
| Hunter.io | Email discovery and verification platform for finding corporate email addresses, patterns, and organizational contacts for social engineering research. |
| C2 Platform | Description |
|---|---|
| Cobalt Strike | Industry-standard commercial C2 framework with malleable profiles, Beacon payload, post-exploitation modules, process injection, and team collaboration for red team operations. |
| BruteRatel | Advanced C2 framework with userland hook removal, sleep masking, customizable communication channels, and superior EDR evasion designed for professional red teams. |
| Loki | Lightweight open-source C2 framework emphasizing simplicity and OPSEC-safe design for covert command and control operations. "EDR/AV evasion can be achieved through implantation using a script-jack vulnerability in electron applications." |
| Sliver | Cross-platform open-source C2 by Bishop Fox supporting mTLS/WireGuard/HTTP/DNS, dynamic code generation, multiplayer mode, and compile-time obfuscation. |
| MythicAgents | Collaborative multi-platform C2 with plug-and-play agent architecture, containerized microservices, flexible communication profiles, and browser-based team interface. |
| Havoc | Modern open-source C2 alternative to Cobalt Strike featuring Demon agents, indirect syscalls, sleep obfuscation, and modular payload design for evasion. |
| Nimhawk | Stealthy C2 framework written in Nim language offering native speed, small payload sizes, and cross-platform capabilities for red team engagements. |
| Specter Insight | C2 platform combining offensive operations with analytics-driven approach to adversary emulation and security validation. |
| Adaptix C2 | C2 platform combining offensive operations with analytics-driven approach to adversary emulation and security validation. |
| Sryxen | “A platform developed by EvilByte focuses on exfiltrating data from victim endpoints and evading security controls.” |
| Rust Pulse C2 | |
| Bear C2 | Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups |
| Facing-the-world | Description |
|---|---|
| BounceBack | Highly configurable reverse proxy/redirector with WAF functionality, traffic filtering, malleable C2 validation, and domain fronting to shield C2 infrastructure. |
| C3 | Custom Command and Control framework enabling creation of resilient, decentralized C2 channels through various interconnected relay mechanisms. |
| Drip | Reverse proxy/redirector with WAF functionality, traffic filtering, malleable C2 validation, and domain fronting to shield C2 infrastructure. |
| Phishing Platform | Description |
|---|---|
| Evilginx Pro | Commercial version of Evilginx offering advanced reverse-proxy phishing with session token stealing to bypass MFA, including premium support and additional features. |
| Evilginx 3.0 | Open-source man-in-the-middle attack framework transparently proxying authentication flows to capture credentials and session cookies, defeating 2FA/MFA protections. |
| Gophish | Open-source phishing simulation platform with campaign management, email template customization, landing pages, real-time analytics, and REST API for security awareness training. |
| EvilGoPhish | Integration combining Gophish's campaign management with Evilginx's MFA bypass capabilities for sophisticated phishing simulations. |
| GitHubDeviceCodePhishing | Tool for extracting Chrome's App-Bound Encryption to extract cookies, credentials, and sensitive data from Chromium-based browsers for post-exploitation. |
| CamPhish | Tool for extracting Chrome's App-Bound Encryption to extract cookies, credentials, and sensitive data from Chromium-based browsers for post-exploitation. |
| Legit Mail Server | Description |
|---|---|
| GoDaddy Email | Professional email hosting service providing legitimate SMTP infrastructure for phishing campaigns requiring reputable sender domains. |
| Mailgun | Transactional email API service offering programmatic email delivery, tracking, and delivery optimization for large-scale phishing campaigns. |
| SendGrid | Cloud-based email delivery platform with high deliverability rates, detailed analytics, and API access for automating phishing operations. |
| Repo/Tool | Description |
|---|---|
| Rust for malware Development | Educational repository teaching Rust-based implant development leveraging memory safety, low-level control, and cross-compilation for modern red team operations. |
| ChromElevator (Chrome App-Bound Encryption Decryption) | Tool for bypassing Chrome's App-Bound Encryption to extract cookies, credentials, and sensitive data from Chromium-based browsers for post-exploitation. |
| EvilBytecode | Collection of malware development projects, PoCs, and offensive security tools demonstrating various implant techniques and evasion methods. |
| OffensiveCpp | Curated collection of C++ offensive security projects including process injection, EDR bypass, shellcode loaders, and exploitation techniques. |
| OffensiveGo | Repository of offensive Golang projects for implant development, infrastructure tooling, and cross-platform exploitation utilities. |
| OffensiveRust | Collection of Rust-based offensive security tools demonstrating system-level programming for malware development and post-exploitation. |
| SharpCollection | Pre-compiled .NET assembly collection for red team operations including privilege escalation, lateral movement, and Active Directory exploitation. |
| UnProtect | Comprehensive malware evasion techniques database documenting anti-analysis, anti-debugging, and EDR/AV bypass methods with classification and PoCs. |
| DumpChromeSecrets | Tool for extracting Chrome's App-Bound Encryption to extract cookies, credentials, and sensitive data from Chromium-based browsers for post-exploitation. |
| Malware Source Code | Collection of malware source code, PoCs, and offensive security tools demonstrating various implant techniques and evasion methods. |
| Yara Rule | Description |
|---|---|
| Elastic Protections Artifacts | Elastic Protections Artifacts is a collection of Yara rules for detecting and identifying malicious artifacts in a lab environment. |
| Defender Yara | Defender Yara is a collection of Yara rules for detecting and identifying malicious artifacts in a lab environment. |
