Skip to content

Offensive Security Experts

Customizable solutions to educate clients, identify security risks, inform intelligent business decisions, and enable you to reduce your attack surface digitally, physically and socially.

Red Teaming®

A multi-layered attack simulation designed to measure how well a company’s people and networks, applications, and physical security controls can withstand an attack from an adversary.

Penetration Testing

Inspects your network, application, device, and physical security through the eyes of BOTH a malicious actor and an experienced cybersecurity expert.

Social Engineering

Commonly known as “people hacking,” we aim to identify venerabilities by accessing a system, device, or physical premises.

Is You're Company Compliant?

RedTeam Security are the experts in helping you meet your industry’s security compliance standards, from banking to healthcare, retail and beyond.

PCI Penetration Testing

NERC CIP Compliance

HIPAA Penetration Testing

FDIC Penetration Testing

Cryptocurrency Compliance

Getting Started With PlugBot #2 – RedTeam Security Tool


Welcome to the second in a long-awaited series of videos on how to get started with the PlugBot. Please see video #1 in this series if you have not already viewed it.

The PlugBot is a research tool developed by us and heavily used during our red team operations. It’s designed to be a rogue device primarily used to establish remote persistence within a target (once it’s been physically deployed) and enable the execution of tools (ie: nmap, Nessus), scripts (ie:, exploits, etc. Once physical infiltration has been made, it allows the consultant (aka Attacker) to quickly deploy it and exit while providing an advanced platform for pivoting and exploitation once she’s left the building.

Multiple bots within the PlugBot botnet are managed through a centralized GUI where tools, scripts, exploits can be executed remotely as well as be installed remotely. We hope you find these videos useful and thank you for watching!

For more information, see our PlugBot Research Project page.

10-Point Offensive Security Checklist

Get A Bird's Eye View Of Your Organization's Security Readiness

Services Datasheet

Recent Posts

Featured On

National TV news and media outlets often consult with us for our expertise as a
boutique, high-touch ethical hacking firm highly trained in a narrow field of cyber
security. Please click on any logo below to view the featured story.