Virtual Machine for Adversary Emulation and Threat Hunting by RedHunt Labs. RedHunt OS aims to be a one stop shop for all your threat emulation and threat hunting needs by integrating attacker’s arsenal as well as defender’s toolkit to actively identify the threats in your environment.
Tool Setup
Open Source Intelligence (OSINT):
Also Read – EVABS : An Open Source Android Application That Is Intentionally Vulnerable
Changelog
Setup:
VM Credentials: Username: hunter Password: hunter
Caldera Credentials: Username: admin Password: caldera
Version 1
Sneak Peek
Pystinger is a Python-based tool that enables SOCKS4 proxying and port mapping through webshells. It…
Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…
Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…
If you are working with Linux or writing bash scripts, one of the most common…
What is a bash case statement? A bash case statement is a way to control…
Why Do We Check Files in Bash? When writing a Bash script, you often work…