Categories: Kali Linux

RedGhost : Linux Post Exploitation Framework

RedGhost is the Linux post exploitation framework designed to assist red teams in persistence, reconnaissance, privilege escalation and leaving no trace.

  • Payloads : Function to generate various encoded reverse shells in netcat, bash, python, php, ruby, perl.
  • SudoInject : Function to inject sudo command with wrapper function to run a reverse root shell everytime “sudo” is run for privilege escalation.
  • lsInject : Function to inject the “ls” command with a wrapper function to run payload everytime “ls” is run for persistence.
  • SSHKeyInject : Function to log keystrokes of a ssh process using strace.
  • Crontab : Function to create cron job that downloads payload from remote server and runs payload every minute for persistence.
  • SysTimer : Function to create systemd timer that downloads and executes payload every 30 seconds for persistence.
  • GetRoot : Function to try various methods to escalate privileges.
  • Clearlogs : Function to clear logs and make investigation with forensics difficult.
  • MassInfoGrab : Function to grab mass reconaissance/information on system.
  • CheckVM : Function to check if the system is a virtual machine.
  • MemoryExec : Function to execute remote bash script in memory.
  • BanIp : Function to BanIp using iptables

Also Read – Evil WinRM : The Ultimate WinRM Shell For Hacking/Pentesting

Installation

One liner to install it:

wget https://raw.githubusercontent.com/d4rk007/RedGhost/master/redghost.sh; chmod +x redghost.sh; ./redghost.sh

One liner to install prerequisites and it:

wget https://raw.githubusercontent.com/d4rk007/RedGhost/master/redghost.sh; chmod +x redghost.sh; apt-get install dialog; apt-get install gcc; apt-get install iptables; apt-get install strace; ./redghost.sh

Prerequisites

  • dialog
  • gcc
  • iptables
  • strace
R K

Recent Posts

Relocatable : A Tool For Position Independent Code

Relocatable is an innovative tool designed to simplify the creation of Position Independent Code (PIC)…

20 hours ago

Understanding Vulnerability And Its Tools In Cybersecurity

In cybersecurity, a vulnerability refers to a flaw or weakness in a system, application, or…

20 hours ago

BOF WinRM Client : Advancing Stealth And Efficiency In Remote System Management

The BOF WinRM Client is a Beacon Object File (BOF) extension for Cobalt Strike that…

20 hours ago

Dioxus : Revolutionizing Cross-Platform Development With Rust

Dioxus is a cutting-edge framework for building cross-platform applications using the Rust programming language. It…

20 hours ago

Modrinth : A Comprehensive Overview Of Tools And Functions

Modrinth is a cutting-edge platform designed to revolutionize the world of Minecraft modding. Focused primarily…

22 hours ago

Deno : The Next Generation JavaScript Runtime For Modern Web Development

Deno is a modern runtime for JavaScript, TypeScript, and WebAssembly, designed to address some of…

22 hours ago