
Red Team Planning Document
#Security Testing#Offensive Security
A quick and dirty dynamic redirect.rules generator for penetration testers and security professionals.
This document helps inform red
This document helps inform red team planning by contrasting against the very specific red team style described in Red Teams
This method expresses several biases
This method expresses several biases to optimize for blue team value and enthusiasm
It specifically avoids attempts to
It specifically avoids attempts to motivate by red team punishment.
Review the questions below to test if your red team planning has been thoroughly thought out for your blue team's value.
❌ Negative motivations
The following are common reasons
The following are common reasons to drive a red team exercise
These have damaging qualities to
These have damaging qualities to morale or team cohesion.
An exercise may be the wrong tool for your goals.
Prove the insecurity of another organization
Display dominance over a group of people
Prove or make a point through shock and awe
Enumerate and discover as many vulnerabilities as possible
Test if simple detection mechanisms are working
���� Stakeholders
Nothing could be more wasteful than an exercise without any sponsorship or follow up from leadership or influencers.
Make sure the learnings of an exercise are championed by an enthusiastic group of stakeholders.
Make sure this group is informed and can generate momentum.
Set expectations and a known home / owner to drive the exercise.
Other AI Tools

RTFSig
A simple JWT token brute force cracker
Details
Visit site

Reversing With Lena (Tutorials)
Falcon Sandbox is a malware analysis framework that provides in-depth static and dynamic analysis of files, offering hybrid analysis, behavior indicators, and integrations with various security tools.
Details
Visit site

Rootkit Hunter
Define and validate YARA rule metadata with CCCS YARA Specification.
Details
Visit site

ROPgadget Tool
A Scriptable Android Debugger for reverse engineers and developers.
Details
Visit site

Ropper
Automatic analysis of malware behavior using machine learning.
Details
Visit site

Sabotage: Code added to popular NPM package wiped files in Russia and Belarus
A dataset release policy for the Android Malware Genome Project, requiring authentication and justification for access to the dataset.
Details
Visit site