Cookie Consent by Free Privacy Policy Generator ๐Ÿ“Œ RedTeam-Physical-Tools - Red Team Toolkit - A Curated List Of Tools That Are Commonly Used In The Field For Physical Security, Red Teaming, And Tactical Covert Entry

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š RedTeam-Physical-Tools - Red Team Toolkit - A Curated List Of Tools That Are Commonly Used In The Field For Physical Security, Red Teaming, And Tactical Covert Entry


๐Ÿ’ก Newskategorie: IT Security Nachrichten
๐Ÿ”— Quelle: kitploit.com

ย 

๏‘ฎ

***The links of the products may change with time, if so, just ping me on twitter so I can update them. None of the links are affiliated or sponsored. Also, I have personally purchased almost every single item from this list out of my own pocket based on needs for engagements. If there are any other items that are not on this list and you believe they should be, feel free to DM or ping me on twitter (@DavidProbinsky) and I can add them.***


Commonly used tools for Red Teaming Engagements, Physical Security Assessments, and Tactical Covert Entry.

In this list I decided to share most of the tools I utilize in authorized engagements, including where to find some of them, and in some cases I will also include some other alternative tools. I am not providing information on how to use these tools, since this information can be found online with some research. My goal with this list is to help fellow Red Teamers with a 'checklist', for whenever they might be missing a tool, and use this list as a reference for any engagement. Stay safe and legal!!



Recon Tool Where to find Alternative
1. Camera with high zoom Recommended: Panasonic Lumix FZ-80 with 60x Zoom Camera Alternative: If not the Panasonic, you can use others. There are many other good cameras in the market. Try to get one with a decent zoom, any camera with over 30x Optical Zoom should work just fine.
1.1 Polarized Camera Filters Recommended: Any polarized filter that fits the lens of your camera. Alternatives: N/A.
2. Body Worn Action Camera Recommended: GoPro cameras or the DJI Osmo Action cameras Alternatives: There are other cheaper alternative action cameras that can be used, however the videos may not have the highest quality or best image stabilization, which can make the footage seem wobbly or too dark.
3. Drone with Camera Recommended: DJI Mavic Mini Series or any other drone that fits your budget. N/A
4. Two-Way Radios or Walkie Talkies Recommended: BaoFeng UV-5R Alternatives would be to just use cellphones and bluetooth headsets and a live call, however with this option you will not be able to listen to local radio chatter. A cell phone serves the purpose of being able to communicate with the client in case of emergency.
5. Reliable flashlight Amazon, Ebay, local hardware store If you want to save some money, you can always use the flashlight of your cellphone, however some phones cant decrease the brightness intensity.
6. Borescope / Endoscope Recommended: USB Endoscope Camera There are a few other alternatives, varying in price, size, and connectivity.
7. RFID Detector Recommended: One good benefit of the Dangerous Things RFID Diagnostics Card is that its the size of a credit card, so it fits perfectly in your wallet for EDC use. Cheaper Alternative: The RF Detector by ProxGrind can be used as a keychain.
8. Alfa AWUS036ACS 802.11ac Recommended: Alfa AWUS036ACS N/A
9. CANtenna N/A Yagi Antennas also work the same way.



LockPicking & Entry Tools Recommended Alternatives
10. A reliable ScrewDriver with changeable bits Recommended: Wera Kraftform Alternative: Any other screwdriver set will work just fine. Ideally a kit which can be portable and with different bits
11. A reliable plier multitool Recommended: Gerber Plier Multitool Alternatives: any reliable multitool of your preference
12. Gaffer Tape Recommended because of its portability: Red Team Tools Gaffer Tape Alternatives: There are many other options on Amazon, but they are all larger in size.
13. A reliable set of 0.025 thin lockpick set Recommended to get a well known brand with good reputation and quality products. Some of those are: TOOOL, Sparrows, SouthOrd, Covert Instruments N/A. You do not want a pick breaking inside of a client's lock. Avoid sets that are of unknown brands from ebay.
14. A reliable set of 0.018 thin lockpick set Recommended to get a well known brand with good reputation and quality products. Some of those are: TOOOL, Sparrows, SouthOrd, Covert Instruments N/A.
15. Tension bars Recommended: Covert Instruments Ergo Turner Set or Sparrows Flatbars There are many other alternatives, varying in sizes and lengths. I strongly recommend having them in varying widths.
16. Warded picks Recommended: Red Team Tools Warded Lock Picks Alternative: Sparrows Warded Pick Set
17. Comb picks Recommended: Covert Instruments Quad Comb Set Alternative options: Sparrows Comb .45 and the Red Team Tools Comb Picks
18. Wafer picks Recommended: Red Team Tools Wafer Picks Alternatives: Sparrows Warded & Wafer Picks with Case
19. Jigglers Recommended: Red Team Tools Jiggler Alternatives: Sparrows Coffin Keys
20. Dimple lockpicks Recommended: Sparrows Black Flag Alternatives: The "Lishi" of Dimple locks Dangerfield Multi-Dimple Lock Picking Tool - 'The Gamechanger'
21. Tubular lockpicks Recommended: Red Team Tools Quick-Connect Tubular Lockpick Alternative: If you are very skilled at picking, you can go the manual route of tensioning and single pin picking, but it will take a lot longer to open the lock. With the Sparrows Goat Wrench you are able to do so.
22. Disk Pick Recommended: Sparrows Disk Pick N/A
23. Lock Lubricant Powdered Graphite found on Ebay or Amazon can get the job done. N/A
24. Plug spinner Recommended: Red Team Tools Peterson Plug Spinner Alternative: LockPickWorld GOSO Pen Style Plug Spinner
25. Hinge Pin Removal Tool Recommended: Red Team Tools Hammerless Hinge Pin Tool Here are some other alternatives: Covert Instruments Hinge Pin Removal Tools
26. PadLock Shims Recommended: Red Team Tools Padlock Shims 5-Pack Alternative: Covert Instruments Padlock Shims 20-pack
27. Combination lock decoders Recommended: Covert Instruments Decoder Bundle Alternative: Sparrows Ultra Decoder
28. Commercial door hook or Adams Rite Recommended: Covert Instruments Commercial Door Hook Alternative: Red Team Tools "Peterson Tools Adams Rite Bypass Wire" or the Sparrows Adams Rite Bypass Driver
29. Lishi Picks IYKYK N/A
30. American Lock Bypass Driver Recommended: Red Team Tools American Lock Padlock Bypass Driver Alternative: Sparrows Padlock Bypass Driver
31. Abus Lock Bypass Driver Recommended: N/A N/A



Bypass Tools Recommended Alternatives
32. Travelers hook Both Red Team Tools Travelers Hook and Covert Instruments Travelers Hook are solid options. N/A
33. Under Door Tool "UDT" Recommended: Sparrows UDT Alternative: Red Team Tools UDT
34. Camera film Recommended: Red Team Tools Film Canister N/A
35. Jim tool Recommended: Sparrows Quick Jim Alternative: Red Team Tools Rescue Jim
36. Crash bar tool "DDT" Recommended: Sparrows DDT Alternative: Serepick DDT
37. Deadbolt Thumb Turn tool Recommended: Both Covert Instruments J tool and Red Team Tools J Tool are solid options N/A
38. Door Latch shims Recommended: Red Team Tools Mica Door Shims Alternative: Covert Instruments Mica Door Shims
39. Strong Magnet Recommended: N/A The MagSwitches. Quick search online and you will find them.
40. Bump Keys Recommended: Sparrows Bump Keys N/A
41. Seattle RAT "SEA-RAT" Recommended: Seattle Rapid Access Tool Alternative: I've heard of the use of piano wire also, but I have not used it myself. IYKYK
42. Air Wedge Recommended: Covert Instruments Air Wedge N/A
43. Can of Compressed Air Recommended: Red Team Tools Air Canister Nozzle Head Cans of compressed air, usually found at your local stores
44. Proxmark3 RDV4 Recommended: Red Team Tools Proxmark RDV4 Alternative: Hacker Warehouse Proxmark3 RDV4
45. General use keys Recommended: Hooligan Keys - Devious, Troublesome, Hooligan! N/A
46. Alarm panels, Cabinets, other keys Recommended: Hooligan Keys Covert Instruments keys
47. Elevator Keys Recommended: Sparrows Fire Service Elevator Key Set N/A



Implants Recommended Alternatives
48. Rubber Ducky or Bash Bunny Recommended: HAK5 USB Rubber Ducky and the HAK5 Bash Bunny Alternatives: The USB Digispark.
49. DigiSpark No recommended links at the moment, but often found on overseas online sellers. Its a cheaper alternative to the Rubber Ducky or the Bash Bunny.Read more.
50. Lan Turtle HAK5 Lan Turtle N/A
51. Shark Jack Recommended: HAK5 Shark Jack N/A
52. Key Croc Recommended: HAK5 Key Croc N/A
53. Wi-Fi Pineapple Recommended: HAK5 WiFi Pineapple N/A
54. O.MG Plug Recommended: HAK5 O.MG Plug N/A
55. ESPKey Recommended: Red Team Tools ESPKey N/A



EDC Tools Recommended Alternatives
56. Pwnagotchi Recommended to build. Pwnagotchi Website. N/A
57. Covert Belt Recommended: Security Travel Money Belt N/A
58. Bogota LockPicks Recommended for EDC: Bogota PI N/A
59. Dog Tag Entry Tool set Recommended: Black Scout Survival Dog Tag N/A
60. Sparrows Wallet EDC Kit Recommended: Sparrows Chaos Card; Sparrows Chaos Card: Wary Edition; Sparrows Shimmy Card; Sparrows Flex Pass; Sparrows Orion Card N/A
61. SouthOrd Jackknife Recommended: SouthOrd Jackknife Alternative: SouthOrd Pocket Pen Pick Set
62. Covert Companion Recommended: Covert Instruments - Covert Companion N/A
63. Covert Companion Turning Tools Recommended: Covert Instruments - Turning Tools N/A



Additional Tools Recommended Alternatives
64. Ladders Easy to carry ladders, for jumping over fences and walls. N/A
65. Gloves Thick comfortable gloves, Amazon has plenty of them. N/A
66. Footwear It varies, depending if social engineering or not. If in the open field, use boots. N/A
67. Attire Dress up depending on the engagement. If in the field, use rugged strong clothes. If in an office building, dress accordingly. N/A
68. Thick wool blanket At least a 5x5 and 1 inch thick, or barbed wires will shred you. N/A
69. First Aid Kit Many kits available on Amazon. N/A



Suppliers or Cool sites to check Website N/A
Sparrows Lock Picks https://www.sparrowslockpicks.com/ N/A
Red Team Tools https://www.redteamtools.com/ N/A
Covert Instruments https://covertinstruments.com/ N/A
Serepick https://www.serepick.com/ N/A
Hooligan Keys https://www.hooligankeys.com N/A
SouthOrd https://www.southord.com/ N/A
Hak5 https://shop.hak5.org/ N/A
Sneak Technology https://sneaktechnology.com/ N/A
Dangerous Things https://dangerousthings.com/ N/A
LockPickWorld https://www.lockpickworld.com/ N/A
TIHK https://tihk.co/ N/A
Lost Art Academy https://lostartacademy.com/ N/A
Toool https://www.toool.us/ N/A
More coming soon! More coming soon! N/A


...



๐Ÿ“Œ What metrics and key performance indicators (KPIs) are commonly used in Scrum to measure team productivity and project success?


๐Ÿ“ˆ 39.23 Punkte

๐Ÿ“Œ Linux Foundation Releases List of Most commonly used open-source Software & Security Problems


๐Ÿ“ˆ 38.29 Punkte

๐Ÿ“Œ Awesome Android Security - A Curated List Of Android Security Materials And Resources For Pentesters And Bug Hunters


๐Ÿ“ˆ 36.86 Punkte

๐Ÿ“Œ Psudohash - Password List Generator That Focuses On Keywords Mutated By Commonly Used Password Creation Patterns


๐Ÿ“ˆ 36.37 Punkte

๐Ÿ“Œ GitHub - actuator/Android-Security-Exploits-YouTube-Curriculum: ๐Ÿ”“A curated list of modern Android exploitation conference talks.


๐Ÿ“ˆ 31.34 Punkte

๐Ÿ“Œ GitHub - awesome-lists/awesome-bash: A curated list of delightful Bash scripts and resources.


๐Ÿ“ˆ 31.23 Punkte

๐Ÿ“Œ Die Kรถnigsdisziplin der Penetrationstests: Blue Frost Security GmbH stellt Redteam-Testing vor


๐Ÿ“ˆ 30.92 Punkte

๐Ÿ“Œ โ€œLove,โ€ โ€œGirl,โ€ and โ€œAngelโ€ are the Most Commonly Used Words for Passwords


๐Ÿ“ˆ 30.17 Punkte

๐Ÿ“Œ โ€œLove,โ€ โ€œGirl,โ€ and โ€œAngelโ€ are the Most Commonly Used Words for Passwords


๐Ÿ“ˆ 30.17 Punkte

๐Ÿ“Œ Good PPAs: A curated list of PPAs to easily add on new Ubuntu installations


๐Ÿ“ˆ 29.43 Punkte

๐Ÿ“Œ Good PPAs: A curated list of PPAs to easily add on new Ubuntu installations


๐Ÿ“ˆ 29.43 Punkte

๐Ÿ“Œ A curated list of Assembly Language / Reversing / Malware Analysis -resources


๐Ÿ“ˆ 29.43 Punkte

๐Ÿ“Œ A curated secrets management reading list


๐Ÿ“ˆ 29.43 Punkte

๐Ÿ“Œ A curated list of resources to build your own Linux distribution


๐Ÿ“ˆ 29.43 Punkte

๐Ÿ“Œ GitHub - kahun/awesome-sysadmin: A curated list of amazingly awesome open source sysadmin .


๐Ÿ“ˆ 29.43 Punkte

๐Ÿ“Œ Win16.Redteam


๐Ÿ“ˆ 29 Punkte

๐Ÿ“Œ Frostbyte - FrostByte Is A POC Project That Combines Different Defense Evasion Techniques To Build Better Redteam Payloads


๐Ÿ“ˆ 29 Punkte

๐Ÿ“Œ Conformance Technologies Deepens Relationship with InfoSecure Redteam


๐Ÿ“ˆ 29 Punkte

๐Ÿ“Œ Frostbyte โ€“ FrostByte Is A POC Project That Combines Different Defense Evasion Techniques To Build Better Redteam Payloads


๐Ÿ“ˆ 29 Punkte

๐Ÿ“Œ Medium CVE-2021-44097: Contact-form-with-messages-entry-management project Contact-form-with-messages-entry-management


๐Ÿ“ˆ 28.8 Punkte

๐Ÿ“Œ shd - console tool to display drive list with commonly checked smart info


๐Ÿ“ˆ 28.78 Punkte

๐Ÿ“Œ NSA shares list of vulnerabilities commonly exploited to plant web shells


๐Ÿ“ˆ 28.78 Punkte

๐Ÿ“Œ shd 0.1 - console tool to display drive list with commonly checked smart info


๐Ÿ“ˆ 28.78 Punkte

๐Ÿ“Œ Phishing is still the most commonly used attack on organizations, survey says


๐Ÿ“ˆ 28.37 Punkte

๐Ÿ“Œ RDP & VPN: Why These Outdated Solutions Are Still Commonly Used


๐Ÿ“ˆ 28.37 Punkte

๐Ÿ“Œ These file types are the ones most commonly used by hackers to hide their malware


๐Ÿ“ˆ 28.37 Punkte

๐Ÿ“Œ Commonly Used DNS with Example Usage


๐Ÿ“ˆ 28.37 Punkte

๐Ÿ“Œ How to Manipulate the DOM in JavaScript โ€“ Most Commonly Used Techniques


๐Ÿ“ˆ 28.37 Punkte

๐Ÿ“Œ Most Commonly Used Passwords Of 2018


๐Ÿ“ˆ 28.37 Punkte

๐Ÿ“Œ Most Commonly Used Passwords Of 2018


๐Ÿ“ˆ 28.37 Punkte

๐Ÿ“Œ Open-source tool for hardening commonly used HMI/SCADA system


๐Ÿ“ˆ 28.37 Punkte

๐Ÿ“Œ Most Commonly Used WordPress Functions. The Ultimate Cheatsheet


๐Ÿ“ˆ 28.37 Punkte

๐Ÿ“Œ Most commonly used PINs putting smart phones to cyber risks


๐Ÿ“ˆ 28.37 Punkte











matomo