RedWarden is a Cobalt Strike C2 Reverse proxy that helps evade detection by Blue Teams, AVs, EDRs, and scanners through packet inspection and malleable profile correlation. It provides a robust solution for penetration testers and red teams to operate undetected in a network. With its advanced features, RedWarden enables users to bypass security controls and maintain a stealthy presence in the target environment. The tool's packet inspection capability allows it to analyze incoming traffic and modify or drop packets to avoid detection. Additionally, its malleable profile correlation feature enables it to adapt to changing network conditions and evade signature-based detection. RedWarden is an open-source tool, licensed under GPL-3.0, and is available on GitHub. It is a valuable resource for cybersecurity professionals and researchers looking to improve their skills in penetration testing and red teaming.
This tool is not verified yet and doesn't have listed features.
Did you submit the verified tool? Sign in to add features.
Are you the author? Claim the tool by clicking the icon above. After claiming, you can add features.
A free and open source C2 and proxy for penetration testers
A distributed systems and infrastructure simulator for attacking and debugging Kubernetes.
An image with commonly used tools for creating a pentest environment easily and quickly, with detailed instructions for launching in a VPS.
LinEnum is a tool for Linux enumeration that provides detailed system information and performs various checks and tasks.
An open source network penetration testing framework with automatic recon and scanning capabilities.
A toolkit to attack Office365, including tools for password spraying, password cracking, token manipulation, and exploiting vulnerabilities in Office365 APIs and services.