Within the information security department, employees are usually divided into two teams: Blue and Red team. The task of the Blue team is to protect the company’s IT infrastructure and prevent IS incidents, the task of the Red team is to simulate the actions of cybercriminals and find vulnerabilities in the system. The Red Team is a group that plays the role of an enemy or competitor to provide security feedback from that perspective. Red teams are used in many fields, especially cyber security, airport security, law enforcement, military, and intelligence. Blue Teams are employees of the IT departments of in-house and outsourced companies who are responsible for monitoring the security of the network infrastructure, identifying any possible vulnerabilities and responding to all attacks. Without the coordinated work of these units, penetration testing in the Red Team format is impossible in principle. One of the main tasks of the Blue Team is to implement ways to counter, change and regroup defense mechanisms to make incident response faster and more effective.
Red Team and Blue Team have essential tools to fight each other: such as the smart contract analysis tool, the official security scanner for Ethereum smart contracts supported by the Ethereum Foundation, the static analysis tool that detects vulnerabilities and bugs in Solidity applications, the automatic tool to find tracing vulnerabilities in Ethereum smart contracts. And a lot of other interesting software.
Used to detect vulnerable dependencies.
Dependency-free container penetration toolkit.
Docker analysis tools from unsafe sources.
An open source Kubernetes security platform for your IDEs, pipelines.
It is a container security toolkit based on veinmind-sdk.
Runtime threat management and attack path inventory for Cloud Native.
It is a standalone tool that retrieves and searches the file systems of containers mapping the contents against a database of approximately 140 secret types.
It is a static vulnerability scanner, a set of tools for discovering Docker cluster configuration. It checks Kubernetes and Docker configurations.
Ehole is a tool for identifying fingerprints of key systems in a pair of assets. In red team operations, information gathering is an important link.
It is a tool for network scanning, Man in the Middle, Reverse Engineering and Fuzzing.
It is a multipurpose pentest framework written in Python.
A comprehensive tool to help penetration testing projects.
This is a very high-quality graphical tool for penetrating the intranet.
LadonGo is an open source intranet intrusion scanner framework.
A tool for quickly identifying available intranet network segments.
This is software for testing wireless security and attacks.
Event-driven pentest scanner. Service scanning (standard and non-standard ports).
It is a set of tools that can be used to attack SCM systems.
This is a rogue AP platform to easily create these fake networks.
It is a set of wireless tests with extensible and independent components.
The tool analyzes the wireless networks you’ve previously connected to and gives you a security score.
Wifite is designed to use all known methods of obtaining a wireless access point (router) password.
Fully aggressive framework for 802.11 networks with different types of attacks for WPA/WPA2 and WEP.
Able to efficiently work with data vectors, which allows you to quickly find nearest neighbors in large data.