Cyber Security News

New RedExt Chrome Extension Tool for Red Teamers with Flask-based C2 Server

A sophisticated new red team tool called RedExt has recently been released, combining a Manifest V3 Chrome extension with a Flask-based Command and Control (C2) server to create a powerful framework for authorized security operations. 

This innovative tool enables comprehensive browser data collection and analysis through a modern dark-themed dashboard interface.

RedExt operates as a beacon-based system that executes tasks assigned by the C2 server. 

The framework includes multiple data collection modules that can extract sensitive browser information, including cookies, browsing history, screenshots, clipboard contents, DOM structures, local storage data, and detailed system information.

RedExt, developed by Security researcher ShadowByte, can operate entirely within the browser context, leveraging Chrome’s extensive API capabilities while maintaining a persistent connection to its command infrastructure.

The framework’s architecture consists of two main components: a Chrome extension built on Manifest V3 and a Python Flask server with SQLite database backend. 

This combination allows for efficient task assignment, data collection, and centralized analysis.

RedExt Implementation and Deployment

Security professionals can deploy RedExt by first setting up the C2 server with a few simple commands:

The Chrome extension can then be configured by editing the C2 server address in the background.js file:

Deployment options include GUI-based installation through Chrome’s extension management page or command-line installation:

Operational Functionality

Once deployed, RedExt establishes a connection between the extension (agent) and the C2 server. Security professionals can manage agents, assign tasks, and analyze collected data from the operator dashboard.

The task execution system supports multiple operation types:

  • DOM snapshot capture for webpage analysis
  • Cookie exfiltration with domain-specific filtering
  • Screenshot capture of active browser tabs
  • System reconnaissance including browser environment and hardware details
  • Browsing history collection with timestamps and visit frequencies
  • Bookmark extraction preserving folder structures and metadata

While RedExt demonstrates the potential vulnerabilities of browser extensions, it is explicitly designed for authorized red team operations and security research. The GitHub repository emphasizes: “This tool is designed for authorized operations only.”

Security experts note that tools like RedExt highlight the importance of proper extension vetting and browser security policies. 

Organizations should review their browser security controls and consider implementing extension whitelisting to mitigate similar threats..

RedExt is publicly available on GitHub with comprehensive documentation including installation guides, usage instructions, and technical details. 

As browser-based attack vectors continue to evolve, tools like RedExt provide valuable insights for both offensive security professionals and defenders seeking to understand and mitigate emerging threats in the browser landscape.

Are you from the SOC and DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.

Guru Baran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Hackers Exploits Windows Via UAC Bypass Technique to Deploy Remcos RAT

A newly identified phishing campaign deploys the Remcos Remote Access Trojan (RAT) using DBatLoader, leveraging…

11 minutes ago

67% of Organizations Faces Cyber Attack in The Past 12 Months – New Report

Cyber attacks continue to plague organizations worldwide, with a staggering 67% of businesses reporting they…

1 hour ago

Ivanti EPMM 0-day Vulnerability Actively Exploited in the Wild

Ivanti has disclosed two zero-day vulnerabilities in its Endpoint Manager Mobile (EPMM) solution. When chained…

2 hours ago

Hacker Charged for Hijacking SEC Account to Promote Fake Bitcoin News

Eric Council Jr., a 26-year-old man from Huntsville, Alabama, was sentenced on May 16, 2025,…

2 hours ago

AI Web Application Firewalls Bypassed Using Prompt Injection Techniques

Web Application Firewalls (WAFs) have been a critical defense mechanism protecting web applications from malicious…

2 hours ago

Microsoft Published a Practical Guide for Migrating BitLocker Recovery Key Management From ConfigMgr to Intune

As organizations transition to modern management with Microsoft Intune, migrating BitLocker recovery key management from…

3 hours ago