RedGhost v3.0 - Linux Post Exploitation Framework Written In Bash Designed To Assist Red Teams In Persistence, Reconnaissance, Privilege Escalation And Leaving No Trace




Linux post exploitation framework designed to assist red teams in persistence, reconnaissance, privilege escalation and leaving no trace.

  • Payloads

Function to generate various encoded reverse shells in netcat, bash, python, php, ruby, perl
  • SudoInject
Function to inject sudo command with wrapper function to run a reverse root shell everytime "sudo" is run for privilege escalataion
  • lsInject
Function to inject the "ls" command with a wrapper function to run payload everytime "ls" is run for persistence
  • SSHKeyInject
Function to log keystrokes of a ssh process using strace
  • Crontab
Function to create cron job that downloads payload from remote server and runs payload every minute for persistence
  • SysTimer
Function to create systemd timer that downloads and executes payload every 30 seconds for persistence.
  • GetRoot
Function to try various methods to escalate privileges
  • Clearlogs
Function to clear logs and make investigation with forensics difficult
  • MassInfoGrab
Function to grab mass reconaissance/information on system
  • CheckVM
Function to check if the system is a virtual machine
  • MemoryExec
Function to execute remote bash script in memory
  • BanIp
Function to BanIp using iptables

Installation
one liner to install RedGhost:
wget https://raw.githubusercontent.com/d4rk007/RedGhost/master/redghost.sh; chmod +x redghost.sh; ./redghost.sh
One liner to install prerequisites and RedGhost:
wget https://raw.githubusercontent.com/d4rk007/RedGhost/master/redghost.sh; chmod +x redghost.sh; apt-get install dialog; apt-get install gcc; apt-get install iptables; apt-get install strace; ./redghost.sh

Prerequisites
dialog, gcc, iptables, strace


RedGhost v3.0 - Linux Post Exploitation Framework Written In Bash Designed To Assist Red Teams In Persistence, Reconnaissance, Privilege Escalation And Leaving No Trace RedGhost v3.0 - Linux Post Exploitation Framework Written In Bash Designed To Assist Red Teams In Persistence, Reconnaissance, Privilege Escalation And Leaving No Trace Reviewed by Zion3R on 5:15 PM Rating: 5