R

Red Team Guides

Cybersecurity Tools Updated Feb 15, 2026
Visit Official Site

Overview

Red Team Guides is a cybersecurity resource providing recipes and guides for red teaming, which involves simulating real-world attacks on computer systems to test their defenses. This guide is designed to help security professionals and teams improve their defenses against various types of cyber attacks. The guide includes information on penetration testing, vulnerability assessment, and other security testing techniques.

Problem It Solves

Improving computer system defenses against cyber attacks

Target Audience: Security professionals and teams

Inputs

  • System configuration data
  • Vulnerability scan results
  • Penetration testing reports

Outputs

  • Security vulnerability reports
  • Penetration testing results
  • System hardening recommendations

Example Workflow

  1. 1 Planning and reconnaissance
  2. 2 Vulnerability scanning and exploitation
  3. 3 Post-exploitation and privilege escalation
  4. 4 Reporting and documentation
  5. 5 Remediation and system hardening

Sample System Prompt


              Simulate a phishing attack on our organization's email system and provide recommendations for improving email security

            

Tools & Technologies

Nmap Metasploit Burp Suite

Alternatives

  • Cobalt Strike
  • Core Impact
  • Immunity Canvas

FAQs

Is this agent open-source?
No
Can this agent be self-hosted?
No
What skill level is required?
Advanced