Using RedRabbit’s Best Pentesting & Post-Exploitation Tools on Windows [Tutorial]

January 21, 2021 by 21 Comments

Earn $$. Learn What You Need to Get Certified (90% Off):

How to Use RedRabbit for Windows Post-Exploitation
Full Tutorial: Https://
Subscribe to Null Byte:
Tim’s Twitter:

Cyber Weapons Lab, Episode 207

RedRabbit is an offensive PowerShell script designed for pen-testers and ethical hackers. Red Rabbit can give a lot of useful information in identifying potential vectors for attack, as well as quickly crack password-protected zip files and dump all saved Wi-Fi credentials. On this episode of Cyber Weapons Lab, we’ll go over a few of the best features to see how they work.

To learn more, check out the article:

Follow Null Byte on:
Weekly newsletter:


21 Replies to “Using RedRabbit’s Best Pentesting & Post-Exploitation Tools on Windows [Tutorial]”

  1. æ says:

    I love the video on AI facial recognition very interesting indeed can you guys make more videos about face recognition and mounting the ESP–EYE into a drone carrying a .22 caliber gun find the target and eradicate from the face of the Earth 🙂

  2. m0nster says:

    You leaked your public address @ 3:51

  3. Wooden stick says:

    So i guess we need first to learn powershell before going so deep.

  4. G4N _ says:

    Greetings, From INDONESIA 🇮🇩

  5. Bryce Jones says:

    Can I run this using the usb rubber ducky?

  6. Show us some ddos😂😂😂

  7. This is awesome. Can you do some other videos on privilege escalations? Or even active directory?

  8. Khalid ATIF says:

    Dude. Trust me on this one and please delete the video… You made a mistake….

  9. a brute force app that outputs after every attempt cannot be good or at least not well performing in principle…

  10. couldn't U pen test u'r personal ethernet network?? it would show us a better window in2 being an outside tester!