BlackArch Arsenal
26 AI-powered security tools inspired by BlackArch Linux & Security Onion for Red Team, Blue Team, and Purple Team operations. Features 12 groundbreaking Red Team Innovations for real-world network penetration testing. Integrated with the Guardian Posse relay fleet for automated security assessment and adversary emulation.
What is BlackArch Linux?
BlackArch Linux is an Arch Linux-based distribution for penetration testers and security researchers, containing over 2,800 tools for offensive and defensive security operations. Guardian Posse channels the power of BlackArch's philosophy by providing AI-enhanced versions of the most critical security tool categories — no manual installation, no complex configuration. Each tool generates MITRE ATT&CK mappings, NIST compliance evidence, and actionable security intelligence.
Our BlackArch Arsenal tools are organized into three operational teams following industry-standard security team structures:
Deploy Relay
Connect your local machine to Guardian Posse for remote security testing
Choose Your Team
Select Red, Blue, or Purple team tools — or explore 12 Red Team Innovations
View ArsenalRed Team — Offensive Tools
Simulate real-world attacks to identify vulnerabilities before adversaries do
Social Engineering Assessment
Human-Layer Attack SimulationDesign and evaluate social engineering campaigns including phishing, pretexting, vishing, and physical social engineering. Inspired by SET, GoPhish, and King Phisher.
- Phishing campaign design with customizable pretexts
- Employee susceptibility risk scoring
- MITRE ATT&CK Initial Access mapping (T1566, T1078)
- NIST 800-53 AT-2/AT-3 compliance evidence
Wireless Security Audit
WiFi, Bluetooth & RF AssessmentAssess WiFi, Bluetooth, and RF security for enterprise environments. Inspired by Aircrack-ng, Wifite, Kismet, and Bettercap.
- Rogue AP and evil twin detection strategies
- WPA2/WPA3/Enterprise encryption assessment
- 802.1X/RADIUS configuration audit
- NIST 800-53 AC-18/SC-40 compliance
Web App OWASP Testing
OWASP Top 10 & ASVS AssessmentComprehensive web application security assessments following OWASP Top 10 and ASVS methodologies. Inspired by Burp Suite, SQLmap, OWASP ZAP, and Nikto.
- Injection testing (SQL, NoSQL, LDAP, OS command)
- Authentication and session management audit
- XSS, CSRF, SSRF attack vector identification
- API security testing (BOLA, BFLA, mass assignment)
Credential Attack Assessment
Password & Authentication TestingAssess password policies, credential storage, and authentication mechanisms. Inspired by Hashcat, John the Ripper, Hydra, and Mimikatz.
- NIST 800-63B password policy assessment
- Brute force resistance with estimated crack times
- Kerberoasting and AS-REP roasting analysis
- MFA implementation effectiveness review
Defense Evasion Analysis
AV/EDR Bypass & Stealth TestingAnalyze how adversaries bypass security controls including AV/EDR, IDS/IPS, and application whitelisting. Inspired by Veil-Evasion, Shellter, and msfvenom.
- AV/EDR bypass risk analysis (fileless, LOLBins)
- AMSI and ETW bypass vulnerability assessment
- Network evasion (encrypted C2, DNS tunneling)
- Behavioral detection improvement recommendations
Blue Team — Defensive Tools
Protect, detect, and respond to threats with hardened defenses and intelligence
Digital Forensics Investigation
Endpoint & Memory ForensicsConduct endpoint and memory forensics, disk image analysis, file carving, and timeline reconstruction. Inspired by Autopsy, Volatility, Sleuth Kit, and bulk_extractor.
- Memory forensics (process trees, DLL injection, rootkits)
- Disk forensics with MFT analysis and file recovery
- Super timeline generation and reconstruction
- NIST SP 800-86 forensic process compliance
Honeypot Strategy Designer
Deception Technology & Threat IntelDesign and deploy honeypot ecosystems, honey tokens, and deception networks for early kill-chain detection. Inspired by Cowrie, Dionaea, HoneyDB, and T-Pot.
- Deception architecture design and placement
- High vs low interaction honeypot selection
- Honey token strategy (credentials, files, DNS, API keys)
- NIST 800-53 SC-26/SC-30 deception compliance
System Hardening Guide
CIS Benchmarks & DISA STIGsCreate comprehensive hardening guides for Linux, Windows, macOS, and network infrastructure using defense-in-depth principles and CIS Benchmarks.
- OS, network, and application hardening checklists
- CIS Benchmark and DISA STIG alignment scoring
- macOS-specific hardening (Gatekeeper, SIP, FileVault)
- NIST 800-123 server hardening compliance
Detection Engineering
Sigma Rules & SIEM Detection LogicCreate, tune, and validate security detection rules for SIEM platforms and EDR solutions. Write Sigma, Snort/Suricata, and YARA rules with validation plans.
- Sigma rules in YAML for cross-platform detection
- Splunk SPL, Elastic KQL, Sentinel KQL queries
- Snort/Suricata IDS and YARA file rules
- Atomic Red Team validation test plans
Security Onion SOC Platform
NSM, IDS & Full Packet CaptureLeverage Security Onion's full-spectrum network security monitoring: Suricata IDS, Zeek network analysis, full packet capture with Stenographer, and integrated Elastic Stack for correlation. Guardian Posse generates deployment configs, tuning recommendations, and analyst workflows.
- Suricata IDS rule generation with ET/Emerging Threats tuning
- Zeek script generation for protocol-level anomaly detection
- PCAP analysis pipeline with Arkime integration guidance
- Security Onion Console (SOC) dashboard configuration
- Fleet deployment planning for distributed sensor networks
Network Traffic Analyzer
Deep Packet Inspection & Flow AnalysisReal-time network traffic analysis combining NetFlow/sFlow data, DNS query inspection, TLS fingerprinting (JA3/JA4+), and lateral movement detection. Maps findings to MITRE ATT&CK network techniques.
- JA3/JA4+ TLS fingerprinting for C2 and malware detection
- DNS tunneling and DGA domain identification
- NetFlow baseline profiling with anomaly alerting
- Lateral movement detection via SMB/RDP/WinRM patterns
Purple Team — Fusion Tools
Bridge offense and defense with collaborative validation and continuous improvement
Adversary Emulation Planner
APT Group TTP SimulationDesign structured attack simulations replicating specific APT groups using real-world TTPs. Inspired by MITRE CALDERA, Atomic Red Team, and intelligence-driven testing.
- Threat actor profiling with full ATT&CK mapping
- Phase-by-phase emulation plan (Initial Access to Impact)
- Expected Blue Team detection validation criteria
- NIST CA-8 / RA-5 compliance evidence generation
Attack Simulation Playbooks
Repeatable SOC Validation ExercisesCreate detailed, repeatable attack simulation playbooks targeting specific MITRE ATT&CK techniques. Inspired by Atomic Red Team, CALDERA, and Infection Monkey.
- Step-by-step simulation with exact commands
- Expected artifacts and IOC generation
- Detection scoring rubric (Detected/Partial/Missed)
- NIST SI-4 / CA-8 compliance evidence
Detection Gap Remediation
Purple Team Findings to Blue Team FixesBridge Purple Team findings with actionable Blue Team improvements. Analyze failed detections and create comprehensive remediation plans with new detection rules.
- Root cause analysis of detection failures
- Priority-ranked remediation with Sigma rules
- Before/after MITRE ATT&CK heatmap projection
- SOAR integration and automated response actions
Red Team Innovations — 12 Groundbreaking Pen Testing Ideas
Inventive real-world networking attack simulations that solve problems no existing tool addresses. Each innovation is deployable through the Guardian Posse relay fleet.
Shadow VLAN Mapper
Undocumented VLAN Discovery EngineDiscovers undocumented VLANs, VLAN hopping paths, and misconfigured trunk ports that network teams forgot about. Maps the "shadow network" — the actual topology vs. what's documented. Solves the #1 enterprise problem: stale network documentation.
- CDP/LLDP passive harvesting to map trunk links and native VLANs
- DTP negotiation testing for VLAN hopping via double-tagging (802.1Q)
- ARP sweep correlation across VLANs to find inter-VLAN leak paths
- Auto-generates corrected network topology diagrams vs. documented state
BGP Hijack Simulator
Routing Protocol Attack LabSimulates BGP prefix hijacking, route leaking, and OSPF/EIGRP neighbor spoofing in a controlled environment. Most organizations have zero visibility into whether their routing infrastructure would resist a state-level BGP attack. This tool creates safe simulations.
- BGP prefix hijack simulation with AS path prepending analysis
- RPKI/ROA validation coverage assessment for your prefixes
- OSPF LSA injection testing with area boundary analysis
- Generates MANRS compliance checklist and remediation plan
Certificate Transparency Weaponizer
TLS/PKI Infrastructure Attack SurfaceMines Certificate Transparency logs to discover shadow infrastructure, staging servers, internal hostnames leaked in SANs, and wildcard cert misuse. Turns defensive CT logs into an offensive recon goldmine that most orgs don't realize they're exposing.
- CT log mining for subdomain discovery and infrastructure mapping
- Wildcard cert abuse detection — find shared certs across trust boundaries
- Certificate pinning bypass strategy generation per target
- Internal hostname leak detection from SAN/CN fields
DNS Rebinding Forge
Same-Origin Policy Bypass EngineAutomates DNS rebinding attacks against internal services exposed to browsers. The forgotten attack vector — most WAFs, firewalls, and security tools completely ignore DNS rebinding because it bypasses network-layer controls by abusing browser trust.
- Automated DNS rebinding payload generation for internal service access
- Target IoT devices, printers, and IPMI/iLO interfaces on internal nets
- Browser-based port scanning through rebinding pivot chains
- Tests split-horizon DNS and DNS pinning effectiveness
IPv6 Dark Space Exploiter
Dual-Stack Misconfiguration HunterMost enterprise networks have IPv6 enabled but unmonitored — a massive blind spot. This tool discovers IPv6-only services, dual-stack misconfigurations, SLAAC spoofing opportunities, and rogue RA (Router Advertisement) injection points that evade IPv4-focused security stacks.
- Rogue Router Advertisement injection for MITM via SLAAC
- DHCPv6 DNS takeover for credential harvesting
- IPv6 tunnel detection (6to4, Teredo, ISATAP) bypassing IPv4 firewalls
- Dual-stack firewall rule gap analysis — finds IPv6 paths around IPv4 ACLs
Cloud Egress Tunneler
Data Exfiltration Path DiscoveryMaps every possible data exfiltration path from cloud environments — DNS-over-HTTPS, ICMP tunneling, steganography in allowed SaaS uploads, and cloud-native service abuse (S3, Azure Blob, GCS). Proves that perimeter firewalls are irrelevant in cloud-native architectures.
- DNS-over-HTTPS (DoH) exfil testing through corporate proxies
- ICMP tunneling and ping-based data channels
- Cloud storage service abuse (S3/GCS/Azure Blob cross-account)
- Measures DLP effectiveness with controlled exfil simulations
NAC Bypass Toolkit
Network Access Control EvasionTests whether your 802.1X/NAC implementation actually stops unauthorized devices. Most enterprises spend six figures on NAC but never validate it. This tool finds MAC bypass paths, 802.1X EAP downgrade attacks, and MAB (MAC Authentication Bypass) exploitation vectors.
- 802.1X EAP-TLS/PEAP/TTLS downgrade and relay attacks
- MAC Authentication Bypass (MAB) spoofing with learned addresses
- VLAN assignment manipulation after successful NAC auth
- Profiling bypass via device fingerprint spoofing (CDP/DHCP/HTTP UA)
East-West Traffic Infiltrator
Microsegmentation Breach SimulatorTests lateral movement paths that microsegmentation vendors claim to block. Most zero-trust deployments only enforce north-south controls. This tool maps actual east-west paths between workloads, finds segmentation gaps, and proves whether your microsegmentation actually works.
- Service mesh sidecar bypass testing (Istio/Linkerd/Consul Connect)
- Kubernetes network policy escape via hostNetwork/CNI misconfig
- Windows service account lateral movement chain mapping
- Generates microsegmentation gap heatmap with remediation priority
Rogue Protocol Injector
Network Service ImpersonationDeploys rogue network services (DHCP, DNS, WPAD, LLMNR, mDNS, NBNS) to test whether the network detects and blocks unauthorized protocol responses. The classic "Responder" attack upgraded for modern enterprise networks with relay and coercion chains.
- LLMNR/NBNS/mDNS poisoning with NTLMv2 hash capture
- Rogue DHCP server deployment with gateway hijacking
- WPAD proxy injection for credential interception
- NTLM relay chain mapping (PetitPotam/PrinterBug/ShadowCoerce)
SDN/API Plane Attacker
Software-Defined Network ExploitationAttacks the control plane of software-defined networks. Most SDN deployments (OpenFlow, VXLAN, Cisco ACI, VMware NSX) have management APIs that are poorly secured. This tool tests whether an attacker who compromises one server can reprogram the entire network fabric.
- OpenFlow controller exploitation and flow table manipulation
- VXLAN header injection to break network segmentation
- NSX/ACI management API credential discovery and abuse
- SDN controller DoS resilience testing
IoT/OT Protocol Fuzzer
Industrial & Smart Device ExploitationFuzzes network protocols used by IoT and OT devices that traditional scanners ignore — Modbus, BACnet, MQTT, CoAP, Zigbee, and printer languages (PJL/PCL/IPP). These devices are on your network, rarely patched, and running protocols designed before security existed.
- Modbus TCP/RTU command injection and register manipulation
- MQTT broker authentication bypass and topic enumeration
- Printer exploitation (PJL/PCL directory traversal, firmware dump)
- BACnet/IP device discovery and property enumeration
Encrypted Traffic Classifier
Traffic Analysis Without DecryptionIdentifies malicious traffic patterns without breaking encryption — using packet timing, size distributions, TLS metadata, and JA4+ fingerprints. Proves whether your "encrypted = safe" assumption is wrong. Most C2 frameworks have detectable traffic fingerprints even over TLS 1.3.
- JA4+/JA3S fingerprint database for known C2 frameworks (Cobalt Strike, Sliver, Brute Ratel)
- Packet timing analysis for beaconing detection (jitter patterns)
- TLS certificate anomaly detection (self-signed, short-lived, Let's Encrypt staging)
- ESNI/ECH detection for DNS-based blocking strategy validation
Ready to Deploy the Arsenal?
Access all 26 BlackArch Arsenal tools through the Security Documentation Center's AI Assistance tab and relay fleet. Each tool generates compliance evidence, MITRE ATT&CK mappings, and actionable intelligence.
Sign In to Access Tools