SLRT (Streamlined Red Teaming) is a tool that automates the setup of red teaming environments using Configuration as Code. It enables security teams to quickly and efficiently configure and run attack simulations without manual setup steps.
SLRT relies on Ansible to deploy and configure red team tools across multiple systems. Ansible's playbooks and roles are used to define configurations, manage dependencies, and automate the deployment process. This approach ensures consistency and simplifies the setup of complex environments. It also allows to create new roles for custom Red Team tools with ease.
Currently, SLRT supports the following Red Teaming Components:
- Sliver C2 Server
- Nginx Redirector
- VeilDrop Payload Server
- Ghostwriter Red Team Collaboration Tool
- EvilGoPhish
For instructions on how to get started, please use the following link to get started!
🧹 Quality of life improvements
Refactor and clean up the codebase for consistency across roles, playbooks, and directory structures to improve maintainability and readability.
🧪 Testing vs. Production scenarios
Introduce separate environments for testing and production using Ansible tags. Example: use self-signed certificates for testing and Certbot-issued certificates for production deployments.
🔗 Interconnectivity between roles
Improve integration between components (e.g., redirectors and C2 servers) to simplify and automate internal communication and configuration.
🛠️ Extend services with more red team tools
Add additional roles and Ansible configurations for other red teaming tools to support a broader range of offensive capabilities.
🖥️ Web-based GUI for infrastructure management
Develop a user-friendly interface to manage and control the infrastructure, including features like:
- C2 user management
- Payload uploads
- Redirector rule configuration
- Role-based controls per component