Categories: Kali Linux

RedGhost : Linux Post Exploitation Framework

RedGhost is the Linux post exploitation framework designed to assist red teams in persistence, reconnaissance, privilege escalation and leaving no trace.

  • Payloads : Function to generate various encoded reverse shells in netcat, bash, python, php, ruby, perl.
  • SudoInject : Function to inject sudo command with wrapper function to run a reverse root shell everytime “sudo” is run for privilege escalation.
  • lsInject : Function to inject the “ls” command with a wrapper function to run payload everytime “ls” is run for persistence.
  • SSHKeyInject : Function to log keystrokes of a ssh process using strace.
  • Crontab : Function to create cron job that downloads payload from remote server and runs payload every minute for persistence.
  • SysTimer : Function to create systemd timer that downloads and executes payload every 30 seconds for persistence.
  • GetRoot : Function to try various methods to escalate privileges.
  • Clearlogs : Function to clear logs and make investigation with forensics difficult.
  • MassInfoGrab : Function to grab mass reconaissance/information on system.
  • CheckVM : Function to check if the system is a virtual machine.
  • MemoryExec : Function to execute remote bash script in memory.
  • BanIp : Function to BanIp using iptables

Also Read – Evil WinRM : The Ultimate WinRM Shell For Hacking/Pentesting

Installation

One liner to install it:

wget https://raw.githubusercontent.com/d4rk007/RedGhost/master/redghost.sh; chmod +x redghost.sh; ./redghost.sh

One liner to install prerequisites and it:

wget https://raw.githubusercontent.com/d4rk007/RedGhost/master/redghost.sh; chmod +x redghost.sh; apt-get install dialog; apt-get install gcc; apt-get install iptables; apt-get install strace; ./redghost.sh

Prerequisites

  • dialog
  • gcc
  • iptables
  • strace
R K

Recent Posts

Ethical Hacking And Penetration Testing Tools – Harnessing Python For Robust Cybersecurity Solutions

This repository contains tools created by yogSahare0 while learning Python 3 for ethical hacking and penetration testing.…

2 days ago

SentinelEye – Automated Wireless Security Toolkit

"NetSecChallenger" provides a suite of automated tools designed for security professionals and network administrators to…

2 days ago

Autohack : Your Step-By-Step Guide To Installation And Setup

The essential tool for cybersecurity enthusiasts! This guide provides a detailed walkthrough on how to…

2 days ago

Poodone – A Comprehensive Toolkit For Cybersecurity Professionals

Meet "Poodone," the ultimate Python script designed for cybersecurity enthusiasts and professionals alike. Packed with…

3 days ago

Unbekannt Framework – The Comprehensive Hacking And Pentesting Suite For Windows

The Linux version is no longer supported! The last Linux version is 6.0 that you…

3 days ago

Jin – Your Hacking CLI Toolkit

Jin is a hacking command-line tools designed to make your scan port, gathering urls, check…

3 days ago