Welcome to the Useful Algorithms for Red Teams project! This repository is a collection of essential algorithms and tools tailored for offensive security professionals, specifically red teams. Each project demonstrates a different aspect of cybersecurity attack techniques, from network sniffing to password brute forcing, all implemented in Rust for optimal performance and security.
- Description: Performs a TCP SYN scan to identify open ports on a target system.
- Repository: Port Scanner
- Usage: Run the tool to scan a range of ports on a specified target IP.
- Description: Attempts to crack passwords by generating and testing possible combinations.
- Repository: Password Brute Forcing
- Usage: Provide the target hash and run the tool to attempt to find the matching password.
- Description: Tests for SQL injection vulnerabilities by injecting payloads into web applications.
- Repository: SQL Injector Tester
- Usage: Run the tool against a target URL to detect potential SQL injection vulnerabilities.
- Description: Enumerates subdomains for a given domain to find potential attack vectors.
- Repository: Subdomain Enumeration
- Usage: Specify the target domain and run the tool to discover subdomains.
- Description: Intercepts network traffic by spoofing ARP packets.
- Repository: ARP Spoofing
- Usage: Run the tool on a local network to start ARP spoofing.
- Description: Redirects DNS queries to a malicious server.
- Repository: DNS Spoofing
- Usage: Run the tool to start spoofing DNS responses.
- Description: Demonstrates how to exploit a buffer overflow vulnerability.
- Repository: Buffer Overflow Exploitation
- Usage: Run the tool with the appropriate payload to exploit the vulnerability.
- Description: Captures network packets for analysis.
- Repository: Network Sniffing
- Usage: Run the tool to start capturing packets on the network interface.
- Description: Injects and executes shellcode within a running process.
- Repository: Shellcode Injection
- Usage: Provide the shellcode and run the tool to perform the injection.
- Description: Extracts credentials from a target system.
- Repository: Credential Dumping
- Usage: Run the tool to dump credentials from the target system.
Each project is a separate Rust application. To get started, navigate to the desired project directory and build it using Cargo.
cd <project-directory>
cargo build --release
To run any of the tools, navigate to the specific project directory and execute the compiled binary.
cd <project-directory>
cargo run --release
Contributions are welcome! If you have a new algorithm or improvement, feel free to fork this repository and submit a pull request.
This project is licensed under the MIT License. See the LICENSE file for details.