Automated deployment of red team infrastructure using Docker with a web interface for managing offensive security tools.
Redcloud is an automated deployment tool for red team infrastructure using Docker. It allows security professionals to quickly spin up and manage offensive security tools like Metasploit, Empire, and Kali Linux through a web interface, reducing setup time and complexity for penetration tests and red team engagements.
Security researchers, penetration testers, red teamers, and bug bounty hunters who need to deploy and manage scalable attack infrastructure in cloud or on-premise environments.
Redcloud simplifies red team infrastructure deployment with pre-configured Docker templates, a user-friendly web interface, and support for remote deployment, enabling faster setup and easier management compared to manual tool installations.
Automated Red Team Infrastructure deployement using Docker
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Redcloud automatically checks for and installs Docker and Docker Compose on target machines, enabling a full stack deployment in minutes via local, SSH, or docker-machine methods as detailed in the Quick Start.
Includes over 35 pre-configured templates for tools like Metasploit, Empire, and Kali Linux, accessible through Portainer's App Templates for rapid deployment in penetration tests.
Provides a Portainer-based web interface for monitoring containers, managing networks and volumes, and accessing web terminals, reducing command-line overhead for daily operations.
Uses Traefik for routing with auto-generated SSL certificates via omgwtfssl, ensuring HTTPS access and secure proxy management for tools and file sharing.
Maintained as a side project and labeled an early release, it may have undiscovered bugs and limited long-term support, with the maintainer relying on community contributions.
The README warns that default network settings expose container ports externally, requiring manual configuration for secure deployments in sensitive or production environments.
Relies on Docker, Python 3+, and external services like icanhazip.com for IP detection, which can complicate setups in restricted or legacy systems without these prerequisites.