Mini Red Team Toolkit
🕶️ Mini Red Team Toolkit
Hands-on training gear for ethical red teamers and learners.
Build, connect, and control with this compact toolkit designed to teach real-world red team tactics — without risking your main system. Whether you're just starting out or sharpening your CTF skills, this pack delivers functional tools and field-tested scripts to simulate attacks in a safe lab environment.
🧩 What’s Inside:
🔁 Reverse Shell Script
Python backdoor with optional XOR encryption, timeout, and reconnection logic. Receives and executes commands while sending real-time output back to the controller.
🖥️ Command Listener Script
Server-side Python script to control the backdoor. Sends encrypted commands, handles responses, and manages the full remote session.
💣 Post-Exploitation Tools
-
keylogger.py – Records keystrokes to a local file
-
clipboard_hijacker.py – Monitors & replaces clipboard content
-
wifi_creds_dump.py – Dumps saved Wi-Fi credentials (Windows)
-
screenshot_taker.py – Takes live screenshots of the target system
-
port_scanner.py – Lightweight scanner for ports 1–100
-
xor_encoder.py – Encode/decode messages with XOR for stealth testing
📖 Documentation & Safety Material
-
README.txt – Full walkthrough of every script
-
vm_safety_guide.pdf – Safe lab setup tips and precautions
-
vm_build_guide.pdf – Detailed guide to building a secure VM using VMware Workstation, branded for Hack n Back Tech
💡 What You’ll Learn:
-
How reverse shell backdoors work from scratch
-
Building and controlling remote access with raw sockets
-
Output handling, subprocess execution, and real-time interaction
-
Common post-exploitation tricks (clipboard hijack, screenshot capture, keylogging)
-
Basic obfuscation techniques with XOR and manual encoding
👤 Who It’s For:
Perfect for:
-
Students learning cybersecurity fundamentals
-
Ethical hackers building red team labs
-
CTF players and scriptwriters
-
Trainers or educators who need portable, controlled attack simulations
⚠️ Important Notice:
This toolkit is for educational use only and must be used in virtual machines or safe lab environments you control. Never deploy these tools on systems without explicit permission.
Hack n Back Tech is not responsible for misuse.