shad0w Logo

shad0w

0
Free
Updated 11 March 2025
Visit Website

Shad0w is a post-exploitation framework designed to operate covertly on heavily monitored environments, allowing users to perform various tasks without being detected. It provides a range of features and tools to help users navigate and control compromised systems, making it an essential tool for penetration testers and red teamers. With its ability to operate covertly, Shad0w is particularly useful in environments with strict security controls, allowing users to gather information, escalate privileges, and move laterally without being detected.

FEATURES

SIMILAR TOOLS

DueDLLigence is an open-source tool for identifying and analyzing DLL hijacking vulnerabilities in Windows applications, providing automated analysis and remediation guidance.

A penetration testing tool that focuses on web browser exploitation

High-performant, coroutines-driven, and fully customisable Low & Slow load generator for real-world pentesting with undetectability through Tor.

A standard for conducting penetration tests, covering seven main sections from planning to reporting.

An Android port of the Radamsa fuzzing tool compiled with Android NDK to support Android ABIs for security testing on mobile platforms.

Generates shellcode that loads Windows payloads from memory and runs them with parameters.

A week-long series of articles and talks on evading Microsoft Advanced Threat Analytics (ATA) detection

A collection of resources for practicing penetration testing

A C#-based Command and Control Framework for remote access and control of compromised systems.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved