Categories: Kali Linux

RedGhost : Linux Post Exploitation Framework

RedGhost is the Linux post exploitation framework designed to assist red teams in persistence, reconnaissance, privilege escalation and leaving no trace.

  • Payloads : Function to generate various encoded reverse shells in netcat, bash, python, php, ruby, perl.
  • SudoInject : Function to inject sudo command with wrapper function to run a reverse root shell everytime “sudo” is run for privilege escalation.
  • lsInject : Function to inject the “ls” command with a wrapper function to run payload everytime “ls” is run for persistence.
  • SSHKeyInject : Function to log keystrokes of a ssh process using strace.
  • Crontab : Function to create cron job that downloads payload from remote server and runs payload every minute for persistence.
  • SysTimer : Function to create systemd timer that downloads and executes payload every 30 seconds for persistence.
  • GetRoot : Function to try various methods to escalate privileges.
  • Clearlogs : Function to clear logs and make investigation with forensics difficult.
  • MassInfoGrab : Function to grab mass reconaissance/information on system.
  • CheckVM : Function to check if the system is a virtual machine.
  • MemoryExec : Function to execute remote bash script in memory.
  • BanIp : Function to BanIp using iptables

Also Read – Evil WinRM : The Ultimate WinRM Shell For Hacking/Pentesting

Installation

One liner to install it:

wget https://raw.githubusercontent.com/d4rk007/RedGhost/master/redghost.sh; chmod +x redghost.sh; ./redghost.sh

One liner to install prerequisites and it:

wget https://raw.githubusercontent.com/d4rk007/RedGhost/master/redghost.sh; chmod +x redghost.sh; apt-get install dialog; apt-get install gcc; apt-get install iptables; apt-get install strace; ./redghost.sh

Prerequisites

  • dialog
  • gcc
  • iptables
  • strace
R K

Recent Posts

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

4 days ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

1 week ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

1 week ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

1 week ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

1 week ago

This Android Bug Can Crack Your Lock Screen in 60 Seconds

A newly disclosed Android vulnerability is making noise for a good reason. Researchers showed that…

2 weeks ago