shad0w Logo

shad0w

0
Free
Visit Website

Shad0w is a post-exploitation framework designed to operate covertly on heavily monitored environments, allowing users to perform various tasks without being detected. It provides a range of features and tools to help users navigate and control compromised systems, making it an essential tool for penetration testers and red teamers. With its ability to operate covertly, Shad0w is particularly useful in environments with strict security controls, allowing users to gather information, escalate privileges, and move laterally without being detected.

FEATURES

ALTERNATIVES

A list of useful payloads and bypasses for Web Application Security.

CredMaster enhances password spraying tactics with IP rotation to maintain anonymity and efficiency.

A specification/framework for extending default C2 communication channels in Cobalt Strike

A tool for detecting and taking over subdomains with dead DNS records

A toolkit to attack Office365, including tools for password spraying, password cracking, token manipulation, and exploiting vulnerabilities in Office365 APIs and services.

A DNS rebinding attack framework for security researchers and penetration testers.

A next generation version of enum4linux with enhanced features for enumerating information from Windows and Samba systems.

APT Simulator is a tool for simulating a compromised system on Windows.

PINNED