toad.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon server operated by David Troy, a tech pioneer and investigative journalist addressing threats to democracy. Thoughtful participation and discussion welcome.

Administered by:

Server stats:

218
active users

#redteamtools

0 posts0 participants0 posts today
🅰🅻🅸🅲🅴 (🌈🦄)<p>My friend, <span class="h-card" translate="no"><a href="https://defcon.social/@deviantollam" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>deviantollam</span></a></span> (owner of Red Team Tools, and all around great person), asked if I wanted to get hands-on with RTT's gear 😯</p><p>In the immortal words of Kite Man, "Hell yeah!" :neocat_cool_fingerguns: </p><p>So, several days ago, Dev invited me out to a show and handed me a little care package of things RTT is thinking of carrying 💝</p><p>The second package with the gear I picked out from RTT's site should be here in the next few days 😁</p><p>So yeah, I guess it's about time to break into some shit on camera 🤘</p><p><a href="https://www.redteamtools.com" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">redteamtools.com</span><span class="invisible"></span></a></p><p><a href="https://lgbtqia.space/tags/RedTeamTools" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RedTeamTools</span></a> <a href="https://lgbtqia.space/tags/Locksport" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Locksport</span></a> <a href="https://lgbtqia.space/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://lgbtqia.space/tags/Bypass" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bypass</span></a> <a href="https://lgbtqia.space/tags/EDC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EDC</span></a></p>
Lenin alevski 🕵️💻<p>New Open-Source Tool Spotlight 🚨🚨🚨</p><p>pwncat is more than a basic reverse shell handler—it's a post-exploitation platform. With features like PTY spawning, privilege escalation automation, and persistence management, it simplifies red team operations across Linux and now Windows (alpha). Python 3.9+ required. <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/RedTeamTools" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RedTeamTools</span></a></p><p>🔗 Project link on <a href="https://infosec.exchange/tags/GitHub" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GitHub</span></a> 👉 <a href="https://github.com/calebstewart/pwncat" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/calebstewart/pwncat</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Software" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Software</span></a> <a href="https://infosec.exchange/tags/Technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Technology</span></a> <a href="https://infosec.exchange/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a> <a href="https://infosec.exchange/tags/CTF" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CTF</span></a> <a href="https://infosec.exchange/tags/Cybersecuritycareer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecuritycareer</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redteam</span></a> <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blueteam</span></a> <a href="https://infosec.exchange/tags/purpleteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>purpleteam</span></a> <a href="https://infosec.exchange/tags/tips" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tips</span></a> <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/cloudsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cloudsecurity</span></a></p><p>— ✨<br>🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️</p>
Luke Switzer 🅅<p>It’s <a href="https://infosec.exchange/tags/ThrowbackThursday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThrowbackThursday</span></a>, and Evil Crow RF ($25) proves newer isn’t always better.</p><p>While a Flipper Zero offers greater versatility, Evil Crow’s dual-frequency attacks surpass Flipper’s capabilities for focused RF pentesting.</p><p>Even with PandwaRF and HackRF One bringing more firepower, sometimes the affordable OG still holds its own!</p><p><a href="https://infosec.exchange/tags/RedTeamTools" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RedTeamTools</span></a> <a href="https://infosec.exchange/tags/WirelessHacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WirelessHacking</span></a> <a href="https://infosec.exchange/tags/RFHacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RFHacking</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/Pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pentesting</span></a></p>
Astra Kernel :verified:<p>Tools and Techniques for Red Team / Penetration Testing</p><p>📌Collection of tools and resources that can be useful for red teaming activities</p><p><a href="https://github.com/A-poc/RedTeam-Tools" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="">github.com/A-poc/RedTeam-Tools</span><span class="invisible"></span></a> </p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/redteaming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redteaming</span></a> <a href="https://infosec.exchange/tags/redteamingtips" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redteamingtips</span></a> <a href="https://infosec.exchange/tags/bugbountytips" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bugbountytips</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a> <a href="https://infosec.exchange/tags/appsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>appsec</span></a> <a href="https://infosec.exchange/tags/RedteamTools" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RedteamTools</span></a> <a href="https://infosec.exchange/tags/kalilinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>kalilinux</span></a> <a href="https://infosec.exchange/tags/PentestingTools" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PentestingTools</span></a></p>