RedWarden Logo

RedWarden

0
Free
Visit Website

RedWarden is a Cobalt Strike C2 Reverse proxy that helps evade detection by Blue Teams, AVs, EDRs, and scanners through packet inspection and malleable profile correlation. It provides a robust solution for penetration testers and red teams to operate undetected in a network. With its advanced features, RedWarden enables users to bypass security controls and maintain a stealthy presence in the target environment. The tool's packet inspection capability allows it to analyze incoming traffic and modify or drop packets to avoid detection. Additionally, its malleable profile correlation feature enables it to adapt to changing network conditions and evade signature-based detection. RedWarden is an open-source tool, licensed under GPL-3.0, and is available on GitHub. It is a valuable resource for cybersecurity professionals and researchers looking to improve their skills in penetration testing and red teaming.

FEATURES

ALTERNATIVES

Pwndrop is a self-deployable file hosting service for red teamers, allowing easy upload and sharing of payloads over HTTP and WebDAV.

A COM Command & Control framework using JScript for stealthy and flexible command and control capabilities on Windows systems.

Darkarmour is a Windows AV evasion tool that helps bypass antivirus software, allowing for the creation of undetectable malware.

LinEnum is a tool for Linux enumeration that provides detailed system information and performs various checks and tasks.

A tool for detecting and exploiting Server-Side Template Injection (SSTI) vulnerabilities

Pupy is a cross-platform C2 and post-exploitation framework for remote access and control of compromised systems across various operating systems.

A proof-of-concept tool that demonstrates automated MFA bypass techniques for Microsoft Outlook through browser automation and request interception.

A subdomain enumeration tool for bug hunting and pentesting