shad0w Logo

shad0w

0
Free
Visit Website

Shad0w is a post-exploitation framework designed to operate covertly on heavily monitored environments, allowing users to perform various tasks without being detected. It provides a range of features and tools to help users navigate and control compromised systems, making it an essential tool for penetration testers and red teamers. With its ability to operate covertly, Shad0w is particularly useful in environments with strict security controls, allowing users to gather information, escalate privileges, and move laterally without being detected.

FEATURES

ALTERNATIVES

A framework for testing and exploiting race conditions in software

A project for demonstrating AWS attack techniques with a focus on ethical hacking practices.

A blog post about bypassing AppLocker using PowerShell diagnostic scripts

A next generation version of enum4linux with enhanced features for enumerating information from Windows and Samba systems.

Rip web accessible (distributed) version control systems: SVN, GIT, Mercurial/hg, bzr, ...

A set of commands for exploit developers and reverse-engineers to enhance GDB functionality.

AzureC2Relay enhances security by validating and relaying Cobalt Strike beacon traffic through Azure Functions.

A powerful enumeration tool for discovering assets and subdomains.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved