Shad0w is a post-exploitation framework designed to operate covertly on heavily monitored environments, allowing users to perform various tasks without being detected. It provides a range of features and tools to help users navigate and control compromised systems, making it an essential tool for penetration testers and red teamers. With its ability to operate covertly, Shad0w is particularly useful in environments with strict security controls, allowing users to gather information, escalate privileges, and move laterally without being detected.
This tool is not verified yet and doesn't have listed features.
Did you submit the verified tool? Sign in to add features.
Are you the author? Claim the tool by clicking the icon above. After claiming, you can add features.
A structured approach for conducting penetration tests with seven main sections covering all aspects of the test.
A modern post-exploitation command and control framework with a client-server architecture and extensibility features.
A simple SSRF-testing sheriff written in Go
Parrot Security OS is a comprehensive, secure, and customizable operating system for cybersecurity professionals, offering over 600+ tools and utilities for red and blue team operations.
A toolkit to attack Office365, including tools for password spraying, password cracking, token manipulation, and exploiting vulnerabilities in Office365 APIs and services.
A tool that checks expired domains for categorization/reputation and Archive.org history to determine good candidates for phishing and C2 domain names.