Red Commander: open source Red Team C2 Infrastructure

Red Commander is a red team C2 infrastructure built in Amazon AWS using Ansible.

The tool [1] is developed by Alex Williams, security consultant at GuidePoint Security, and can help pentesters improve their defensive responses but can also be used by adversaries to simulate their attacks.


Features

Red Commander provides two Cobalt Strike servers, one for HTTPS communications and the other is for DNS communications which will serve as a backup once the HTTPS server has been taken down.

The tool also includes the following features:

  • Custom Cobalt Strike Package Support
  • Custom MalleableC2 Support per C2
  • C2Concealer Support
  • Modified cs2modrewrite.py from Threat Express
  • Joomla Support for Web Redirectors.
  • Custom EDR Evasion support via Web Redirectors
  • A module that can identify bad IP addresses and eliminate sandboxes from investigating the C2server.

References

  1. https://github.com/guidepointsecurity/RedCommander

Related posts

  1. Backdoorplz, a privilege escalation tool for Windows
  2. Pen Test Partners: Boeing 747 walk through, from a hacker’s perspective
  3. curl: my own cheatsheet
  4. Windows Service Accounts enumeration using Powershell
  5. TLDR #2: Cross-Site Request Forgery