terraform apply. It removes the infrastructure burden so you can focus on learning tradecraft, not fighting configuration.
What you get
Three C2 frameworks
Mythic, Sliver, and Havoc — pre-installed, pre-configured, and running on boot.
Apache redirector
Header validation, URI-prefix routing, and automated scanner/AV blocking via
redirect.rules.Guacamole portal
Browser-based access to every lab machine — SSH to C2 servers, RDP to Windows, VNC to the Havoc desktop.
Windows workstation
Windows Server 2022 with Chromium, VS Code, MobaXterm, and 7-Zip pre-installed.
Dual-VPC isolation
C2 servers have no public IPs. All implant traffic flows through the redirector via VPC peering.
OpenVPN support
Connect to HTB, VulnLab, and Proving Grounds Pro Lab networks directly from the lab.
Who redStack is for
redStack is built for three audiences:Red team operators
Red team operators
Operators who want a realistic, isolated C2 staging environment for tool development, payload testing, and tradecraft practice without spinning up infrastructure from scratch. The dual-VPC design and redirector configuration mirror production red team setups used in real engagements.
Security students
Security students
Students working through red team fundamentals who need a safe, self-contained lab to learn Mythic, Sliver, or Havoc without worrying about infrastructure. Boot-to-Breach means you go from zero to a working C2 callback in under 30 minutes.
CTF players
CTF players
CTF and pro-lab players on HTB, VulnLab, and Proving Grounds who want a persistent, dedicated C2 environment with OpenVPN routing built in. Deploy once, use across multiple lab sessions, tear down when done.
Key features
Three pre-installed C2 frameworks
All three frameworks are installed automatically by Terraform user data scripts — no manual setup required.| Framework | Instance type | Access method | Notes |
|---|---|---|---|
| Mythic | t3.medium | SSH or web UI :7443 | Apollo agent + HTTP C2 profile pre-installed |
| Sliver | t3.small | SSH → sliver-client | Daemon runs as a systemd service on boot |
| Havoc | t3.medium | SSH + VNC (XFCE4 desktop) | Built from source; Havoc client runs on the desktop |
Apache redirector
The redirector is the only component with a public Elastic IP. It sits in an isolated Redirector VPC (10.60.0.0/16) that peers to the TeamServer VPC (10.50.0.0/16) over AWS VPC peering. Three security layers protect the C2 backends:
redirect.rules— blocks requests from AV vendors, scanners, and TOR exits with403 Forbidden- Header validation — requests without a valid
X-Request-IDtoken receive a decoy CloudEdge CDN maintenance page - URI prefix routing — only matching URI prefixes (
/cdn/media/stream,/cloud/storage/objects,/edge/cache/assets) are proxied to the correct C2 server
Guacamole access portal
Apache Guacamole serves as the operator access layer. It runs on a Debian 12 instance with its own public Elastic IP and provides seven pre-configured connections out of the box:- Windows Operator Workstation (RDP)
- Mythic Team Server (SSH)
- Sliver C2 Server (SSH)
- Havoc C2 Server (SSH)
- Havoc C2 Desktop (VNC)
- Apache Redirector (SSH)
- Guacamole Server (SSH)
Hostname resolution
Every lab machine has/etc/hosts entries pre-populated at deploy time. From anywhere inside the lab, you can reach any machine by hostname:
C:\Windows\System32\drivers\etc\hosts with the same entries.
OpenVPN support (HTB / VulnLab / PG)
Whenenable_external_vpn = true, the redirector runs an OpenVPN client and WireGuard bridges traffic from all internal lab machines to the target VPN network. This lets you fire implants at HTB or Pro Lab targets from Mythic, Sliver, or Havoc without routing through your local machine.
Ethical and legal use
AWS terms of service
As long as you are using redStack exclusively for personal lab work and authorized training platforms (HTB, VulnLab, PG, self-hosted cyber ranges), you are generally within AWS acceptable use. A quick conversation with AWS customer support can confirm this for your specific account and usage pattern.
Cost awareness
EC2 instances accrue charges 24/7 whether or not you are actively using them.- Stop instances from the EC2 Dashboard to pause compute charges without destroying the environment (EBS storage still accrues)
terraform destroyis the only way to eliminate all charges — it terminates instances, releases Elastic IPs, and removes all billable resources- Set a billing alarm in the AWS Billing Console to alert you if monthly charges exceed a threshold you set
Get started
Architecture
Understand the dual-VPC network design, EC2 instances, and traffic flow before deploying.
Prerequisites
Install AWS CLI and Terraform, configure IAM credentials, and create your SSH key pair.
Deploy
Run
terraform init, terraform plan, and terraform apply to bring up the full lab.Terraform reference
Full variable reference for customizing instance types, VPC CIDRs, URI prefixes, and more.
