An autonomous Red Team operator tool designed for the CRTP mindset.
- Reliability > Noise: Doesn't spray; validates specific vectors.
- Reasoning: Logs why an attack is attempted (Hypothesis driven).
- Lab Ready: Built for Active Directory labs (like alteredsecurity.com).
RedReason is built on a modular architecture designed for "Senior Red Team" operations:
- Strict Data Model: Uses typed objects (
ADUser,ADComputer) for consistency. - State Sharing: Modules share intelligence to reduce network noise (e.g., Attack module uses Enumeration cache).
- Plugin System: Easily extensible via the
RedReasonModuleinterface.
See Developer Guide for instructions on creating new modules.
-
Enumeration (L0-L2 Maturity):
- Users, Computers, Trusts, LAPS
- DNS: Infrastructure discovery via AD-Integrated zones.
- ACLs: Dangerous ACE detection (GenericAll, WriteDACL).
- GPO: Policy weakness and linkage analysis.
- ADCS: Enterprise CA and ESC1/ESC8 misconfiguration detection.
- Exchange: Server enumeration, PrivExchange (ACLs), and RBAC auditing.
- Virtualization: ESXi/vCenter enumeration, "ESX Admins" abuse (CVE-2024-37085), and Version Fingerprinting.
- Lateral: WinRM/RDP exposure mapping and LAPS coverage.
- Defense: Credential Guard and Defensive Posture checks.
-
Attacks (L3 Execution):
- Kerberoasting: (Saves hashes to
reports/hashes_kerb.txt) - AS-REP Roasting: (Saves hashes to
reports/hashes_asrep.txt) - Identity Hardening: Checks for encryption downgrade risks (RC4/DES).
- Post-Exploitation: Golden Ticket forging capabilities.
- Kerberoasting: (Saves hashes to
-
Reasoning Engine:
- Filters False Positives based on prerequisites.
- Enforces Maturity Model (Presence -> Misconfig -> Validation -> Execution).
RedReason maps its capabilities to the MITRE ATT&CK framework. See full details in docs/mitre_mapping.md.
| Attack ID | Technique |
|---|---|
| T1558 | Steal or Forge Kerberos Tickets (Kerberoasting, AS-REP) |
| T1557 | Adversary-in-the-Middle (SMB Relay / Signing) |
| T1003 | OS Credential Dumping (DCSync) |
| T1552 | Unsecured Credentials (GPP, LAPS) |
| T1649 | Steal or Forge Authentication Certificates (AD CS) |
docker build -t redreason .Mount a volume to /app/reports to access generated reports and dumped hashes.
# Standard Scan (All checks)
docker run --rm -v ${PWD}/reports:/app/reports redreason --target <IP> --domain <DOMAIN> --user <USER> --password <PASS> --module all
# Specific Vector Scans
docker run ... --module acl # Authorization Abuse
docker run ... --module gpo # Group Policy Abuse
docker run ... --module cs # ADCS Abuse
docker run ... --module exchange # Exchange Ops
docker run ... --module virt # Virtualization Ops
docker run ... --module defense # Defensive Posture
# Pass-the-Hash
docker run --rm -v ${PWD}/reports:/app/reports redreason --target <IP> --domain <DOMAIN> --user <USER> --hashes <LM:NT>pip install -r requirements.txt
python main.py --target <IP> --domain <DOMAIN> --user <USER> --password <PASS>Control output detail level with multi-level verbosity:
# Quiet mode (warnings only)
python main.py --target <IP> ... --verbose 0
# Normal mode (default, INFO level)
python main.py --target <IP> ...
# Verbose mode (DEBUG level, detailed checks)
python main.py --target <IP> ... -v
# Very verbose mode (TRACE level, granular diagnostics)
python main.py --target <IP> ... -vvvPassive-only scanning to avoid triggering detection systems:
# Enable stealth mode (skips active coercion attacks, RPC enumeration)
python main.py --target <IP> ... --stealth--bloodhound # Generate BloodHound JSON output
--module <name> # Run specific module (enum, attack, post, acl, gpo, cs, lateral, defense, exchange, virt, all)
--hashes <LM:NT> # Use pass-the-hash authenticationThis project is licensed under the MIT License - see the LICENSE file for details.
Copyright (c) 2026 RedReason Authors
You are free to use, modify, and distribute this software under the terms of the MIT License. This tool is provided "as is" without any warranty.
RedReason is designed for authorized security testing and red team operations in controlled environments (e.g., lab environments, authorized penetration tests). Unauthorized access to computer systems is illegal. Always obtain proper authorization before conducting security assessments.