Redboto is a collection of Python scripts that utilize the Amazon SDK boto3 to perform red team operations against AWS API endpoints. The toolkit includes multiple specialized scripts for different attack scenarios. The getEC2WinCreds.py script enables attackers to download and decrypt initial Windows passwords for EC2 instances when provided with appropriate API keys and .pem files. The getEC2Files.py script represents the most complex component, designed for data exfiltration from EC2 instances. This script requires highly privileged API access and performs automated infrastructure manipulation including: - Creating snapshots of target volumes - Spinning up temporary instances for volume attachment - Creating S3 buckets for data staging - Encrypting and copying selected files to S3 - Downloading and decrypting exfiltrated data - Automatically cleaning up created infrastructure while leaving audit logs The toolkit works effectively in combination with describeInstances.py for gathering EC2 metadata and reconnaissance. Installation requires cryptography, boto3, and texttable Python libraries.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
SauronEye helps in identifying files containing sensitive data such as passwords through targeted directory searches.
SharpShares efficiently enumerates and maps network shares and resolves names within a domain.
BeEF is a specialized penetration testing tool for exploiting web browser vulnerabilities to assess security.
Advanced command and control tool for red teaming and adversary simulation with extensive features and evasion capabilities.
Kali Linux is a specialized Linux distribution for cybersecurity professionals, focusing on penetration testing and security auditing.
Tool for enumerating proxy configurations and generating CobaltStrike-compatible shellcode.
Interactive online malware sandbox for real-time analysis and threat intelligence
A collection of Python scripts for password spraying attacks against Lync/S4B & OWA, featuring Atomizer, Vaporizer, Aerosol, and Spindrift tools.