RedCommander
C2 server setup tool
An AWS-based C2 infrastructure project built with Ansible that enables the creation of Cobalt Strike and RedELK servers for red team operations.
Red Team C2 Infrastructure built in AWS using Ansible!
220 stars
15 watching
21 forks
Language: Python
last commit: about 4 years ago Related projects:
Repository | Description | Stars |
---|---|---|
redsiege/c2concealer | A command line tool that generates randomized C2 malleable profiles for use in threat simulation and red teaming exercises. | 1,013 |
mhaskar/octopus | An open-source pre-operation C2 server that enables stealthy control and information gathering before a red team operation. | 730 |
jfmaes/red-ec2 | A tool for automating the deployment of EC2 instances on AWS using Ansible. | 59 |
nettitude/poshc2 | A C2 framework used to aid red teamers with post-exploitation and lateral movement | 1,820 |
qsecure-labs/overlord | Automates the creation of Red Teaming infrastructure on cloud providers like AWS and Digital Ocean. | 612 |
verizon/redshell | An interactive command-line interface for red teaming and pentesting | 211 |
threatexpress/cs2modrewrite | Automates conversion of Cobalt Strike profiles to modrewrite scripts for HTTP C2 redirection | 583 |
khast3x/redcloud | A toolset for deploying and managing a full Red Team Infrastructure using Docker | 1,211 |
xiaolichan/redcaddy | A C2 redirector based on Caddy that enables customizable redirection and protection of teamserver ports. | 196 |
qax-a-team/cobaltstrike-toolset | A collection of tools and scripts used to simulate cyber attacks | 532 |
bluscreenofjeff/red-team-infrastructure-wiki | A wiki providing resources and guidance on setting up resilient Red Team infrastructure for penetration testing and adversarial security assessments. | 4,149 |
taherio/redi | Automates setup of CobaltStrike redirectors using nginx reverse proxy and LetsEncrypt SSL certificates | 140 |
darmado/atomic-red-team-c2 | A framework for executing and analyzing post-exploitation attacks in a controlled environment | 171 |
redteamoperations/gcptokenreuse | Tools and scripts to help pentesters manage access tokens using the gcloud CLI. | 17 |
xx0hcd/malleable-c2-profiles | A collection of pre-defined threat actor profiles used in Cobalt Strike | 765 |