A sophisticated new red team tool called RedExt has recently been released, combining a Manifest V3 Chrome extension with a Flask-based Command and Control (C2) server to create a powerful framework for authorized security operations.
This innovative tool enables comprehensive browser data collection and analysis through a modern dark-themed dashboard interface.
RedExt operates as a beacon-based system that executes tasks assigned by the C2 server.
The framework includes multiple data collection modules that can extract sensitive browser information, including cookies, browsing history, screenshots, clipboard contents, DOM structures, local storage data, and detailed system information.
RedExt, developed by Security researcher ShadowByte, can operate entirely within the browser context, leveraging Chrome’s extensive API capabilities while maintaining a persistent connection to its command infrastructure.
The framework’s architecture consists of two main components: a Chrome extension built on Manifest V3 and a Python Flask server with SQLite database backend.
This combination allows for efficient task assignment, data collection, and centralized analysis.
Security professionals can deploy RedExt by first setting up the C2 server with a few simple commands:
The Chrome extension can then be configured by editing the C2 server address in the background.js file:
Deployment options include GUI-based installation through Chrome’s extension management page or command-line installation:
Once deployed, RedExt establishes a connection between the extension (agent) and the C2 server. Security professionals can manage agents, assign tasks, and analyze collected data from the operator dashboard.
The task execution system supports multiple operation types:
While RedExt demonstrates the potential vulnerabilities of browser extensions, it is explicitly designed for authorized red team operations and security research. The GitHub repository emphasizes: “This tool is designed for authorized operations only.”
Security experts note that tools like RedExt highlight the importance of proper extension vetting and browser security policies.
Organizations should review their browser security controls and consider implementing extension whitelisting to mitigate similar threats..
RedExt is publicly available on GitHub with comprehensive documentation including installation guides, usage instructions, and technical details.
As browser-based attack vectors continue to evolve, tools like RedExt provide valuable insights for both offensive security professionals and defenders seeking to understand and mitigate emerging threats in the browser landscape.
Are you from the SOC and DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.
A newly identified phishing campaign deploys the Remcos Remote Access Trojan (RAT) using DBatLoader, leveraging…
Cyber attacks continue to plague organizations worldwide, with a staggering 67% of businesses reporting they…
Ivanti has disclosed two zero-day vulnerabilities in its Endpoint Manager Mobile (EPMM) solution. When chained…
Eric Council Jr., a 26-year-old man from Huntsville, Alabama, was sentenced on May 16, 2025,…
Web Application Firewalls (WAFs) have been a critical defense mechanism protecting web applications from malicious…
As organizations transition to modern management with Microsoft Intune, migrating BitLocker recovery key management from…