Red Team Toolkit
There are many challenges to conducting successful cyber operations, and even more when operational security and stealth are necessary for the success of the operation. Red Team Toolkit was built to provide support and reliability in an increasingly challenging offensive landscape.
Defend Against Sophisticated Attacks
Red Team Toolkit is an offensive security platform and tooling suite for red teamers and penetration testers. The toolkit enables teams to perform advanced network operations, collaborate on target exploitation, and better simulate sophisticated adversaries. The Red Team Toolkit Platform provides a unified, easy-to-use web interface that provides multi-user support with tiered permissions, providing a single interface for managing and interacting with targets, and improving your organization’s network security program.
More Than Just a Tool
The Red Team Toolkit Platform is a suite of offensive security tools that drive stealthy cyber operations through all phases of an attack, including initial access, privilege escalation, persistence, and impact. Red Team Toolkit includes several tools, including Slingshot and Throwback. Each tool has a specific purpose to facilitate stealthy operations and adversary emulation.
Slingshot is a powerful post-exploitation agent for red team operations. Built with OpSec first, Slingshot empowers teams to emulate sophisticated adversaries through stealthy injection techniques, memory obfuscation, malleable network profiles, and loads of defensive evasion capabilities. It empowers operations with a limited detection surface, powerful modularity, and ephemeral concepts.
Improve Your Defense in Depth
Use sophisticated attack techniques through all phases of an attack chain to identify gaps in your defense in depth. Work with defensive teams to improve detection capabilities.
OpSec at Every Layer
The Red Team Toolkit platform features over 15 defensive countermeasures. Evasion techniques include leveraging syscalls for stealthy code injection, in-memory obfuscation of modules, as well as AMSI, ETW, and PowerShell logging bypasses. OpSec has been built into every layer of every tool within the Red Team Toolkit Platform, providing a powerful red teaming experience out of the box.
What does Red Team Toolkit cost?
Red Team Toolkit licenses cost $6,000 per user for the first year. Subsequent license renewals cost $3,000 per user per year.
I took the Dark Side Ops training and already have Slingshot. Is this version different?
Yes! The version of Slingshot in Red Team Toolkit is much more functional. Just see the features list above, or contact us for more details.
Does RTT include source code?
Source code of some components is included in the Red Team Toolkit Platform. This includes Slingshot scripts and server side code. The Slingshot agent (e.g. client) consists of several compiled binaries, patched offline with your specific configuration.
We already have tool xyz! Why do we need another red team tool?
Maybe you don’t! There are some great red team tools out there and if you’re able to conduct adversary simulations effectively, then great! We believe offense-in-depth is an essential part of effective operations, and that the features and capabilities included in Red Team Toolkit are absolutely worth it.
Can I get a demo? How about a trial?
Is there documentation? How about tutorials?
Documentation is available within the self-hosted Red Team Toolkit Platform in addition to our Portal. Once deployed, you can review detailed tool usage and functionality, Slingshot scripting examples, and license information. Tutorials can also be found on our YouTube Channel.
Red Team Toolkit Resources
Having a custom, mature toolkit ready and operational is a great opportunity to help teams struggling with offensive tooling limitations and capabilities. Learn more about Red Team Toolkit’s tools, features, and functionality in this data sheet.
A NetSPI red team engagement will put your organization’s security controls, policies, and employee training to the test. NetSPI will work with you to understand your requirements and goals to develop an approach that answers the questions that are important to your business.
Our DSO 1: Malware Dev course focuses on the goals, challenges, architecture, and operations of advanced persistent threat (APT) tooling. And, DSO 2: Adversary Simulation highlights the combination of sophisticated red team trade craft and offensive development to simulate adversary activities.