shad0w Logo

shad0w

0
Free
Visit Website

Shad0w is a post-exploitation framework designed to operate covertly on heavily monitored environments, allowing users to perform various tasks without being detected. It provides a range of features and tools to help users navigate and control compromised systems, making it an essential tool for penetration testers and red teamers. With its ability to operate covertly, Shad0w is particularly useful in environments with strict security controls, allowing users to gather information, escalate privileges, and move laterally without being detected.

FEATURES

ALTERNATIVES

A modular and script-friendly multithread bruteforcer for managing task parameters in Python scripts.

A tool for interacting with Exchange servers remotely and exploiting client-side Outlook features.

A credit card/magstripe spoofer that can emulate any magnetic stripe or credit card wirelessly.

Cutting-edge open-source security tools for adversary simulation and threat hunting.

RedWarden is a Cobalt Strike C2 Reverse proxy that evades detection by Blue Teams, AVs, EDRs, and scanners through packet inspection and malleable profile correlation.

SharpPrinter enables efficient discovery of network printers for security and management purposes.

Python-based toolkit for network hacking with various implemented techniques and supported by Securetia SRL.

Open source penetration testing tool for detecting and exploiting command injection vulnerabilities.