- Bloodhound (AD Security Auditing)
- https://github.com/BloodHoundAD/BloodHound
- Helps Red/Blue Teams identify any potential weankess in a given Active Directory environment
- Photon (Fast Web Crawler OSINT)
- Gnome-Boxes (VM-Host)
- https://wiki.gnome.org/Apps/Boxes
- Virtual Machines to Install in Gnome-Boxes
- Ubuntu 18.04
- Centos 7.x
- Windows 10 Pro (For Reverse Tools)
- Flare VM
- Visual Studio Community or Enterprise
- Pre-compile the following Ghost Pack Binaries
- SharpUp.exe
- Port of PowerUp's privilege escalation checks
- Seatbelt.exe
- Situational awareness "Safety checks"
- SharpRoast.exe
- SafetyKatz.exe
- SharpWMI.exe
- SharpUp.exe
- Pre-compile the following Ghost Pack Binaries
- Windows 10 Pro
- System to Attack
- Test Windows Based exploits
- Microsoft Office
- GitLab Community Edition
- Local software/script/notes repository
- GhostPack
- https://github.com/GhostPack
- C# Security related tools to assist in auditing Windows based systems
- BurpSuite Community or Pro
- All BurpSuite Pro Plugins (if possible)
- Python: Pseudo-Terminal
- http://www.primalsecurity.net/0xb-python-tutorial-pseudo-terminal
python -c "import pty;pty.spawn("/bin/bash")"
- Sparta (latest)
- Graphical Interface to multiple security tools
- Nmap, nikto, hydra, etc
- Graphical Interface to multiple security tools
- Powershell Empire
- Windows Powershell Penetration Testing Tool
- SecLists
- https://github.com/danielmiessler/SecLists
- Lists of common username/passwords and payloadfor security auditing purposes
- Chromium
- Secondary web browser to aid in Web Application testing
- Text Editors/IDEs
- Visual Studio Code
- Atom
- Vim
- Password Auditing Tools
- Hydra
- BRO/Zeek (Network Based IDS)
- Useful for parsing PCAPs during Blue team CTFs or engagements
- Install Guide:
- Python Simple File Upload Capability
- VirtualBox for Linux
- Backup Virtual Machine host
- Cobalt Strike (Adversary Simulation Tool)
- Tool used to simulate various adversary attack vectors to help Blue Teams increase defenses
- Allows creation of C2 (Command and Control) on a network
- Books to have for reference/searching
- Gray Hat C#
- Web Application Hacker's Handbook
- **Iterm2 customization Mac OSX (may work on kali)
Last active
March 30, 2024 18:00
-
-
Save tbalz2319/dc6f4e91471e1c92e0d5c5abc0d9d593 to your computer and use it in GitHub Desktop.
Software to Install/Configure on New Red/Blue/Purple Team Kali/Linux Box
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Great clue, thx for it.