Loading...
Shadow Workers is an open source C2 framework and proxy tool for penetration testers to exploit XSS vulnerabilities and malicious Service Workers.

Shadow Workers is an open source C2 framework and proxy tool for penetration testers to exploit XSS vulnerabilities and malicious Service Workers.
Shadow Workers is an open source command and control (C2) framework and proxy tool designed for penetration testing activities. The tool focuses on exploiting Cross-Site Scripting (XSS) vulnerabilities and malicious Service Workers to establish command and control channels. It provides an interface for creating and managing C2 servers, enabling penetration testers to test and exploit web application vulnerabilities. The framework supports proxy functionality to facilitate communication between compromised targets and the C2 infrastructure. Shadow Workers is specifically designed to assist security researchers and penetration testers in assessing web application security through Service Worker exploitation techniques.
Common questions about Shadow Workers including features, pricing, alternatives, and user reviews.
Shadow Workers is Shadow Workers is an open source C2 framework and proxy tool for penetration testers to exploit XSS vulnerabilities and malicious Service Workers.. It is a Security Operations solution designed to help security teams with C2, Web Security, Offensive Security.
An open-source framework that enables building and deploying AI-powered security automation tools for both offensive and defensive cybersecurity operations using over 300 AI models.
A proof-of-concept Node.js tool that demonstrates automated MFA bypass techniques for Microsoft Outlook accounts using browser automation.
FourCore ATTACK is an adversary emulation platform to manage cyber risk with evidence
RedGuard is a C2 front flow control tool that helps evade detection by security systems through traffic filtering and redirection capabilities.
SharpC2 is a C#-based Command and Control framework that provides remote access capabilities for penetration testing and red team operations.
Get strategic cybersecurity insights in your inbox