- Home
- Security Operations
- Offensive Security
- Shadow Workers
Shadow Workers
Shadow Workers is an open source C2 framework and proxy tool for penetration testers to exploit XSS vulnerabilities and malicious Service Workers.

Shadow Workers
Shadow Workers is an open source C2 framework and proxy tool for penetration testers to exploit XSS vulnerabilities and malicious Service Workers.
Shadow Workers Description
Shadow Workers is an open source command and control (C2) framework and proxy tool designed for penetration testing activities. The tool focuses on exploiting Cross-Site Scripting (XSS) vulnerabilities and malicious Service Workers to establish command and control channels. It provides an interface for creating and managing C2 servers, enabling penetration testers to test and exploit web application vulnerabilities. The framework supports proxy functionality to facilitate communication between compromised targets and the C2 infrastructure. Shadow Workers is specifically designed to assist security researchers and penetration testers in assessing web application security through Service Worker exploitation techniques.
Shadow Workers FAQ
Common questions about Shadow Workers including features, pricing, alternatives, and user reviews.
Shadow Workers is Shadow Workers is an open source C2 framework and proxy tool for penetration testers to exploit XSS vulnerabilities and malicious Service Workers.. It is a Security Operations solution designed to help security teams with C2, Web Security, Offensive Security.
FEATURED
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
Fractional CISO services for B2B companies to build security programs
POPULAR
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
A comprehensive educational resource that provides structured guidance on penetration testing methodology, tools, and techniques organized around the penetration testing attack chain.
TRENDING CATEGORIES
Stay Updated with Mandos Brief
Get strategic cybersecurity insights in your inbox