Take Post Exploitation Ops To The Next Level

Silent Break Security’s Red Team Toolkit combines stealth, functionality, covert channels, and flexibility into an extremely capable toolkit for adversary simulations and red teaming operations.

Receive Demo
Encryption Icon

END-TO-END ENCRYPTION

Zero Process Icon

ZERO PROCESS CREATION

Configurable TTPS Icon

CONFIGURABLE TTPS

In Memory Icon

IN-MEMORY .NET AND POWERSHELL

Multiple Pivoting Icon

MULTIPLE PIVOTING TECHNIQUES

Full Mimikats Icon

FULL MIMIKATS INTEGRATION

Desktop Webcam Capture Icon

DESKTOP AND WEBCAM CAPTURE

Socks and TCP Icon

SOCKS AND TCP TUNNELING

Op Sec First

Our operational standard in developing the Red Team Toolkit is to maintain stealth and opsec as a first priority. This means zero process creation on a target host, 100% in-memory tools and modules, malleable communication profiles, and the latest in anti-forensics and anti-logging techniques.

Receive Demo

Slingshot

Red Team Toolkit includes Slingshot, a post-exploitation agent used to conduct advanced cyber operations. Slingshot is on the forefront of capability and stealth among post-exploitation agents performing adversary simulation.

Red Checkmark

Extensible and Modular

Load and execute PowerShell scripts and .NET assemblies in-memory extending functionality and automating routine tasks.

Red Checkmark

Convert communication

Easily modify details aspects of the C2 traffic including HTTP headers, compression, connection wait times, and much more.

Red Checkmark

Python Scripting Engine

Run custom Python 3 based scripts on targets to analyze command output, conduct host pivots, collect target data, and more.

Red Checkmark

Windows API Integration

Maintain great opsec with zero process creation! Slingshot includes built-in commands for WMI, scheduled tasks, service controller, file manipulation, and registry management to name a few!

Red Checkmark

Everything You Need

…and nothing you don’t. Slingshot includes an in-memory keylogger, SMB comms for host-to-host pivoting, Mimikatz, and the flexibility to load custom DLLs.

Red Checkmark

Great Support

Updates are constantly being made as new features and improvements are pushed to the production version. Got ideas? We want to hear them!

Tutorials

Slingshot is developed by Silent Break Security and used in cyber operations continually. Development is constant as new features and improvements are pushed to the production version.

To showcase Slingshot and other Read Team Toolkit features, instructional videos are provided at the Silent Break Security YouTube Channel.

Watch Tutorials