RedHunt Virtual Machine for Adversary Emulation and Threat Hunting

0
0

Today we have several ready distributions for penetration testing or other type of security project. This provides an opportunity to test and verify the required functionality. One of the new virtual machine is RedHunt.

RedHunt aims to be a one stop shop for all your threat emulation and threat hunting needs by integrating attacker’s arsenal as well as defender’s toolkit to actively identify the threats in your environment.

RedHunt OS (VM): Virtual Machine for Adversary Emulation and Threat Hunting

RedHunt OS (VM): Virtual Machine for Adversary Emulation and Threat Hunting

Attack emulation toolset include Caldera ,Atomic Red Team, DumpsterFire, Metta, RTA, Nmap , CrackMapExec , Metasploit ,Responder and Zap. Logging and Monitoring tools are Kolide Fleet and ELK (Elasticsearch, Logstash, and Kibana) Stack.

The same platform include Maltego , Recon-ng , Datasploit and theHarvestor for Open Source Intelligence (OSINT) and Yeti , Harpoon for Threat Intelligence. The idea behind the project is to have a single VM can be used by blue team exercises in the presence as well as absence of an active attacker. Similarly, red team can utilize the platform to identify and understand the footprints they leave behind during a red team exercise.

You can read more and download the latest distro on GitHub: https://github.com/redhuntlabs

Share