Red Team Operations & C2 Framework
🔴 Red Team Operations & C2 Framework
Overview
This skill enables Claude to assist authorized red team operators with engagement planning, C2 infrastructure design, attack methodology, lateral movement strategy, persistence mechanisms, and comprehensive reporting.
⚠️ CRITICAL: This skill is for AUTHORIZED red team operations ONLY. All activities must be within a defined scope with written authorization. Unauthorized use is illegal.
Prerequisites
- Python 3.8+
pyyaml,requests
Optional Tools
- Cobalt Strike / Sliver / Havoc — C2 frameworks
- Metasploit — Exploitation framework
- BloodHound — AD attack path analysis
- Impacket — Network protocol tools
- CrackMapExec — AD enumeration/exploitation
- Responder — LLMNR/NBT-NS poisoning
pip install pyyaml requests impacket
Core Capabilities
1. Red Team Engagement Planning
When the user asks to plan an engagement:
- Define objectives, scope, and rules of engagement
- Create attack scenario narratives (APT simulation)
- Map target infrastructure and attack surface
- Plan the kill chain phases
- Define success criteria and reporting requirements
- Create deconfliction procedures
- Plan communication channels with blue team POCs
- Document emergency abort procedures
2. C2 Infrastructure Design
When the user asks about C2:
- Design multi-tier C2 architecture (redirectors → team servers)
- Configure HTTPS/DNS/DoH/WebSocket C2 channels
- Set up domain fronting or cloud redirectors
- Implement malleable C2 profiles for evasion
- Plan backup C2 channels
- Set up logging and operational security measures
- Implement automated infrastructure teardown
3. Lateral Movement Strategy
When the user asks about lateral movement:
- Enumerate Active Directory attack paths (BloodHound)
- Identify privilege escalation opportunities
- Plan WMI/PSExec/WinRM/DCOM movement techniques
- Kerberoasting and AS-REP roasting strategies
- Pass-the-Hash / Pass-the-Ticket techniques
- Token impersonation and delegation abuse
- GPO abuse for mass deployment
- Document each movement step for reporting
4. Persistence Mechanisms
When the user asks about persistence:
- Registry run keys and startup folder persistence
- Scheduled tasks and services
- DLL hijacking and COM objects
- WMI event subscriptions
- Golden/Silver ticket creation
- DACL/SACL manipulation
- Web shells for web server persistence
- Firmware/UEFI-level persistence (advanced)
5. Social Engineering
When the user asks about social engineering:
- Phishing campaign planning and templates
- Pretexting scenarios
- Callback phishing (vishing) scripts
- USB drop attack planning
- Physical security assessment methodology
- Badge cloning and tailgating strategies
Usage Instructions
Example Prompts
> Plan a red team engagement for testing our AD security
> Design a resilient C2 infrastructure for an authorized test
> What lateral movement techniques should I try after initial compromise?
> Create persistence mechanisms for continued access during the engagement
> Generate a phishing pretext for our authorized social engineering test
Script Reference
engagement_planner.py
python scripts/engagement_planner.py --scope scope.json --output plan.md
Integration Guide
- ← Exploit Development (03): Use exploits within red team operations
- ← Recon & OSINT (01): Initial reconnaissance for target profiling
- → Blue Team Defense (15): Provide findings for defensive improvements
- → CSOC Automation (11): Test SOC detection capabilities
References
More from masriyan/claude-code-cybersecurity-skill
reverse engineering & binary analysis
Binary analysis, disassembly, decompilation, firmware RE, and protocol reverse engineering
10incident response & digital forensics
IR playbook execution, evidence collection, timeline analysis, memory forensics, and post-incident reporting
10cryptographic analysis & assessment
Cipher identification, SSL/TLS auditing, hash analysis, key strength assessment, and crypto implementation review
10exploit development & payload engineering
Proof-of-concept development, payload crafting, shellcode generation, and exploitation techniques
10vulnerability scanning & assessment
Automated vulnerability scanning, CVE detection, dependency auditing, and security configuration assessment
7cloud security & container hardening
AWS/Azure/GCP security auditing, container hardening, IaC scanning, and Kubernetes security
7