{"id":5846,"date":"2019-07-19T09:26:05","date_gmt":"2019-07-19T03:56:05","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=5846"},"modified":"2019-07-19T09:26:05","modified_gmt":"2019-07-19T03:56:05","slug":"redghost-linux-post-exploitation-framework","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/redghost-linux-post-exploitation-framework\/","title":{"rendered":"RedGhost :  Linux Post Exploitation Framework Designed To Assist Red Teams In Gaining Persistence, Reconnaissance &#038; Leaving No Trace"},"content":{"rendered":"\n<p><strong>RedGhost<\/strong> is a Linux post exploitation framework designed to assist red teams in persistence, reconnaissance, privilege escalation and leaving no trace. <\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Payloads<\/strong><\/li><\/ul>\n\n\n\n<p>Function to generate various encoded reverse shells in\nnetcat, bash, python, php, ruby, perl<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>SudoInject<\/strong><\/li><\/ul>\n\n\n\n<p>Function to inject sudo command with wrapper function to run a \nreverse root shell everytime &#8220;sudo&#8221; is run for privilege     escalataion<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>lsInject<\/strong><\/li><\/ul>\n\n\n\n<p>Function to inject the &#8220;ls&#8221; command with a wrapper function to run payload everytime &#8220;ls&#8221; is run for persistence<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Crontab<\/strong><\/li><\/ul>\n\n\n\n<p>Function to create cron job that downloads payload from remote server and runs payload every minute for persistence<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>GetRoot<\/strong><\/li><\/ul>\n\n\n\n<p>Function to try various methods to escalate privileges<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Clearlogs<\/strong><\/li><\/ul>\n\n\n\n<p>Function to clear logs and make investigation with forensics difficult<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>MassInfoGrab<\/strong><\/li><\/ul>\n\n\n\n<p>Function to grab mass reconaissance\/information on system<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>CheckVM<\/strong><\/li><\/ul>\n\n\n\n<p>Function to check if the system is a virtual machine<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>MemoryExec<\/strong><\/li><\/ul>\n\n\n\n<p>Function to execute remote bash script in memory<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>BanIp<\/strong><\/li><\/ul>\n\n\n\n<p>Function to BanIp using iptables<\/p>\n\n\n\n<p style=\"text-align:center\"><strong>Also Read &#8211; <a href=\"https:\/\/kalilinuxtutorials.com\/ghostfuscator\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Ghostfuscator : The Python Password-Protected Obfuscator (opens in a new tab)\">Ghostfuscator : The Python Password-Protected Obfuscator<\/a><\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/d4rk007\/RedGhost#installation\"><\/a><\/h2>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><strong>Installation<\/strong><\/p>\n\n\n\n<p>one liner to install RedGhost:<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>wget https:\/\/raw.githubusercontent.com\/d4rk007\/RedGhost\/master\/redghost.sh; chmod +x redghost.sh; .\/redghost.sh <\/strong><\/p>\n\n\n\n<p>One liner to install prerequisites and RedGhost:<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>wget https:\/\/raw.githubusercontent.com\/d4rk007\/RedGhost\/master\/redghost.sh; chmod +x redghost.sh; apt-get install dialog; apt-get install gcc; apt-get install iptables; .\/redghost.sh <\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/d4rk007\/RedGhost#prerequisites\"><\/a><\/h3>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><strong>Prerequisites<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Dialog<\/li><li>GCC<\/li><li>IPtables<\/li><\/ul>\n\n\n\n<div class=\"wp-block-button aligncenter is-style-squared\"><a class=\"wp-block-button__link has-background has-vivid-cyan-blue-background-color\" href=\"https:\/\/github.com\/d4rk007\/RedGhost\"><strong>Download<\/strong><\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>RedGhost is a Linux post exploitation framework designed to assist red teams in persistence, reconnaissance, privilege escalation and leaving no trace. Payloads Function to generate various encoded reverse shells in netcat, bash, python, php, ruby, perl SudoInject Function to inject sudo command with wrapper function to run a reverse root shell everytime &#8220;sudo&#8221; is run [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":15686,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/1.bp.blogspot.com\/-1yLc5idIQ8I\/XS_nnJvqyuI\/AAAAAAAABZY\/2awztfABrBIzKgblOYmi5s7gWtXZeJvpACLcBGAs\/s1600\/RedGhost.PNG","fifu_image_alt":"RedGhost :  Linux Post Exploitation Framework Designed To Assist Red Teams In Gaining Persistence, Reconnaissance & Leaving No Trace","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[1896,2772,2775],"class_list":["post-5846","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-linux","tag-red-teams","tag-redghost"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>RedGhost : Linux Post Exploitation Framework To Assist Red Teams<\/title>\n<meta name=\"description\" content=\"RedGhost is a Linux post exploitation framework designed to assist red teams in persistence, reconnaissance, privilege escalation and leaving no trace.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/redghost-linux-post-exploitation-framework\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"RedGhost : Linux Post Exploitation Framework To Assist Red Teams\" \/>\n<meta property=\"og:description\" content=\"RedGhost is a Linux post exploitation framework designed to assist red teams in persistence, reconnaissance, privilege escalation and leaving no trace.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/redghost-linux-post-exploitation-framework\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2019-07-19T03:56:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/1.bp.blogspot.com\/-1yLc5idIQ8I\/XS_nnJvqyuI\/AAAAAAAABZY\/2awztfABrBIzKgblOYmi5s7gWtXZeJvpACLcBGAs\/s1600\/RedGhost.PNG\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/1.bp.blogspot.com\/-1yLc5idIQ8I\/XS_nnJvqyuI\/AAAAAAAABZY\/2awztfABrBIzKgblOYmi5s7gWtXZeJvpACLcBGAs\/s1600\/RedGhost.PNG\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/redghost-linux-post-exploitation-framework\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/redghost-linux-post-exploitation-framework\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"RedGhost : Linux Post Exploitation Framework Designed To Assist Red Teams In Gaining Persistence, Reconnaissance &#038; Leaving No Trace\",\"datePublished\":\"2019-07-19T03:56:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/redghost-linux-post-exploitation-framework\/\"},\"wordCount\":238,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/redghost-linux-post-exploitation-framework\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-1yLc5idIQ8I\/XS_nnJvqyuI\/AAAAAAAABZY\/2awztfABrBIzKgblOYmi5s7gWtXZeJvpACLcBGAs\/s1600\/RedGhost.PNG\",\"keywords\":[\"linux\",\"Red Teams\",\"RedGhost\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/redghost-linux-post-exploitation-framework\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/redghost-linux-post-exploitation-framework\/\",\"name\":\"RedGhost : Linux Post Exploitation Framework To Assist Red Teams\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/redghost-linux-post-exploitation-framework\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/redghost-linux-post-exploitation-framework\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-1yLc5idIQ8I\/XS_nnJvqyuI\/AAAAAAAABZY\/2awztfABrBIzKgblOYmi5s7gWtXZeJvpACLcBGAs\/s1600\/RedGhost.PNG\",\"datePublished\":\"2019-07-19T03:56:05+00:00\",\"description\":\"RedGhost is a Linux post exploitation framework designed to assist red teams in persistence, reconnaissance, privilege escalation and leaving no trace.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/redghost-linux-post-exploitation-framework\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/redghost-linux-post-exploitation-framework\/#primaryimage\",\"url\":\"https:\/\/1.bp.blogspot.com\/-1yLc5idIQ8I\/XS_nnJvqyuI\/AAAAAAAABZY\/2awztfABrBIzKgblOYmi5s7gWtXZeJvpACLcBGAs\/s1600\/RedGhost.PNG\",\"contentUrl\":\"https:\/\/1.bp.blogspot.com\/-1yLc5idIQ8I\/XS_nnJvqyuI\/AAAAAAAABZY\/2awztfABrBIzKgblOYmi5s7gWtXZeJvpACLcBGAs\/s1600\/RedGhost.PNG\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"RedGhost : Linux Post Exploitation Framework To Assist Red Teams","description":"RedGhost is a Linux post exploitation framework designed to assist red teams in persistence, reconnaissance, privilege escalation and leaving no trace.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/redghost-linux-post-exploitation-framework\/","og_locale":"en_US","og_type":"article","og_title":"RedGhost : Linux Post Exploitation Framework To Assist Red Teams","og_description":"RedGhost is a Linux post exploitation framework designed to assist red teams in persistence, reconnaissance, privilege escalation and leaving no trace.","og_url":"https:\/\/kalilinuxtutorials.com\/redghost-linux-post-exploitation-framework\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2019-07-19T03:56:05+00:00","og_image":[{"url":"https:\/\/1.bp.blogspot.com\/-1yLc5idIQ8I\/XS_nnJvqyuI\/AAAAAAAABZY\/2awztfABrBIzKgblOYmi5s7gWtXZeJvpACLcBGAs\/s1600\/RedGhost.PNG","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/1.bp.blogspot.com\/-1yLc5idIQ8I\/XS_nnJvqyuI\/AAAAAAAABZY\/2awztfABrBIzKgblOYmi5s7gWtXZeJvpACLcBGAs\/s1600\/RedGhost.PNG","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/redghost-linux-post-exploitation-framework\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/redghost-linux-post-exploitation-framework\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"RedGhost : Linux Post Exploitation Framework Designed To Assist Red Teams In Gaining Persistence, Reconnaissance &#038; Leaving No Trace","datePublished":"2019-07-19T03:56:05+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/redghost-linux-post-exploitation-framework\/"},"wordCount":238,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/redghost-linux-post-exploitation-framework\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-1yLc5idIQ8I\/XS_nnJvqyuI\/AAAAAAAABZY\/2awztfABrBIzKgblOYmi5s7gWtXZeJvpACLcBGAs\/s1600\/RedGhost.PNG","keywords":["linux","Red Teams","RedGhost"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/redghost-linux-post-exploitation-framework\/","url":"https:\/\/kalilinuxtutorials.com\/redghost-linux-post-exploitation-framework\/","name":"RedGhost : Linux Post Exploitation Framework To Assist Red Teams","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/redghost-linux-post-exploitation-framework\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/redghost-linux-post-exploitation-framework\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-1yLc5idIQ8I\/XS_nnJvqyuI\/AAAAAAAABZY\/2awztfABrBIzKgblOYmi5s7gWtXZeJvpACLcBGAs\/s1600\/RedGhost.PNG","datePublished":"2019-07-19T03:56:05+00:00","description":"RedGhost is a Linux post exploitation framework designed to assist red teams in persistence, reconnaissance, privilege escalation and leaving no trace.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/redghost-linux-post-exploitation-framework\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/redghost-linux-post-exploitation-framework\/#primaryimage","url":"https:\/\/1.bp.blogspot.com\/-1yLc5idIQ8I\/XS_nnJvqyuI\/AAAAAAAABZY\/2awztfABrBIzKgblOYmi5s7gWtXZeJvpACLcBGAs\/s1600\/RedGhost.PNG","contentUrl":"https:\/\/1.bp.blogspot.com\/-1yLc5idIQ8I\/XS_nnJvqyuI\/AAAAAAAABZY\/2awztfABrBIzKgblOYmi5s7gWtXZeJvpACLcBGAs\/s1600\/RedGhost.PNG"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/1.bp.blogspot.com\/-1yLc5idIQ8I\/XS_nnJvqyuI\/AAAAAAAABZY\/2awztfABrBIzKgblOYmi5s7gWtXZeJvpACLcBGAs\/s1600\/RedGhost.PNG","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":6034,"url":"https:\/\/kalilinuxtutorials.com\/redghost-linux-post-exploitation-2\/","url_meta":{"origin":5846,"position":0},"title":"RedGhost : Linux Post Exploitation Framework","author":"R K","date":"August 3, 2019","format":false,"excerpt":"RedGhost is the Linux post exploitation framework designed to assist red teams in persistence, reconnaissance, privilege escalation and leaving no trace. Payloads : Function to generate various encoded reverse shells in netcat, bash, python, php, ruby, perl.SudoInject : Function to inject sudo command with wrapper function to run a reverse\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":5492,"url":"https:\/\/kalilinuxtutorials.com\/redghost-linux-post-exploitation\/","url_meta":{"origin":5846,"position":1},"title":"RedGhost : Linux Post Exploitation Framework Designed To Assist Red Teams","author":"R K","date":"June 26, 2019","format":false,"excerpt":"RedGhost is a Linux post exploitation framework designed to assist red teams in gaining persistence, reconnaissance and leaving no trace. Also Read - BlueGhost : Network Tool Designed To Assist Blue Teams In Banning Attackers From Linux Servers Features Payloads Function to generate various encoded reverse shells in netcat, bash,\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":35957,"url":"https:\/\/kalilinuxtutorials.com\/awesome-red-team-operation\/","url_meta":{"origin":5846,"position":2},"title":"Awesome-Red-Team-Operation : A Comprehensive Toolkit For Advanced Cybersecurity","author":"Varshini","date":"January 31, 2025","format":false,"excerpt":"The \"Awesome-Red-Team-Operation\" repository is a comprehensive collection of tools designed to support red team operations, penetration testing, and cybersecurity assessments. These tools span various stages of an attack lifecycle, including reconnaissance, exploitation, privilege escalation, lateral movement, and post-exploitation. Below is a detailed overview of the tools and their functionalities: Key\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Awesome-Red-Team-Operation.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Awesome-Red-Team-Operation.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Awesome-Red-Team-Operation.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Awesome-Red-Team-Operation.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Awesome-Red-Team-Operation.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Awesome-Red-Team-Operation.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":11968,"url":"https:\/\/kalilinuxtutorials.com\/torat\/","url_meta":{"origin":5846,"position":3},"title":"ToRat : A Remote Administration Tool Written In Go Using Tor As A Transport Mechanism &#038; RPC For Communication","author":"R K","date":"December 21, 2020","format":false,"excerpt":"ToRat is a Cross Platform Remote Administration tool written in Go using Tor as its transport mechanism currently supporting Windows, Linux, MacOS clients. How to? TL;DR git clone https:\/\/github.com\/lu4p\/ToRat.git cd .\/ToRat sudo docker build . -t torat sudo docker run -it -v \"$(pwd)\"\/dist:\/dist_ext torat Prerequisites Install Docker on Linuxubuntu https:\/\/docs.docker.com\/install\/linux\/docker-ce\/ubuntu\/debian\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":5476,"url":"https:\/\/kalilinuxtutorials.com\/blueghost-banning-attackers-linux-servers\/","url_meta":{"origin":5846,"position":4},"title":"BlueGhost : Network Tool Designed To Assist Blue Teams In Banning Attackers From Linux Servers","author":"R K","date":"June 25, 2019","format":false,"excerpt":"BlueGhost tool utilises various Linux network tools and bash scripting to assist blue teams on defending Debian and Ubuntu based servers from malicious attackers.\u00a0 Scan\/Ban shows connected IPs, scans IP addresses for open ports using nmap and whois search to gather reconnaissance on connected IPs, shows activity on the system,\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":19081,"url":"https:\/\/kalilinuxtutorials.com\/pwncat\/","url_meta":{"origin":5846,"position":5},"title":"Pwncat : Fancy Reverse And Bind Shell Handler","author":"R K","date":"October 11, 2021","format":false,"excerpt":"Pwncat is a post-exploitation platform\u00a0for Linux targets. It started out as a wrapper around basic bind and reverse shells and has grown from there. It streamlines common red team operations while staging code from your attacker machine, not the target. pwncat used to only support Linux, but there has been\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/1.bp.blogspot.com\/-zrZjdYb2AgA\/YVrlntaUvBI\/AAAAAAAALAM\/MlBzEzAG3dAlQ80yU2qagNQrw6QsG-g9wCLcBGAsYHQ\/s1024\/1.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/1.bp.blogspot.com\/-zrZjdYb2AgA\/YVrlntaUvBI\/AAAAAAAALAM\/MlBzEzAG3dAlQ80yU2qagNQrw6QsG-g9wCLcBGAsYHQ\/s1024\/1.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/1.bp.blogspot.com\/-zrZjdYb2AgA\/YVrlntaUvBI\/AAAAAAAALAM\/MlBzEzAG3dAlQ80yU2qagNQrw6QsG-g9wCLcBGAsYHQ\/s1024\/1.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/1.bp.blogspot.com\/-zrZjdYb2AgA\/YVrlntaUvBI\/AAAAAAAALAM\/MlBzEzAG3dAlQ80yU2qagNQrw6QsG-g9wCLcBGAsYHQ\/s1024\/1.png?resize=700%2C400&ssl=1 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/5846","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=5846"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/5846\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/15686"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=5846"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=5846"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=5846"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}