RedGhost is a Linux post exploitation framework designed to assist red teams in persistence, reconnaissance, privilege escalation and leaving no trace.
Function to generate various encoded reverse shells in netcat, bash, python, php, ruby, perl
Function to inject sudo command with wrapper function to run a reverse root shell everytime “sudo” is run for privilege escalataion
Function to inject the “ls” command with a wrapper function to run payload everytime “ls” is run for persistence
Function to create cron job that downloads payload from remote server and runs payload every minute for persistence
Function to try various methods to escalate privileges
Function to clear logs and make investigation with forensics difficult
Function to grab mass reconaissance/information on system
Function to check if the system is a virtual machine
Function to execute remote bash script in memory
Function to BanIp using iptables
Also Read – Ghostfuscator : The Python Password-Protected Obfuscator
Installation
one liner to install RedGhost:
wget https://raw.githubusercontent.com/d4rk007/RedGhost/master/redghost.sh; chmod +x redghost.sh; ./redghost.sh
One liner to install prerequisites and RedGhost:
wget https://raw.githubusercontent.com/d4rk007/RedGhost/master/redghost.sh; chmod +x redghost.sh; apt-get install dialog; apt-get install gcc; apt-get install iptables; ./redghost.sh
Prerequisites
SpyAI is a sophisticated form of malware that leverages advanced technologies to capture and analyze…
The Proxmark3 is a versatile, open-source tool designed for radio-frequency identification (RFID) security analysis, research,…
The "Awesome Solana Security" collection is a comprehensive resource designed to help developers build more…
The "IngressNightmare" vulnerabilities, disclosed in March 2025, represent a critical set of security issues affecting…
AdaptixC2 is an advanced post-exploitation and adversarial emulation framework designed specifically for penetration testers. It…
Bincrypter is a powerful Linux binary runtime crypter written in BASH. It is designed to…