Vshadow Logo

Vshadow

A command line utility for managing volume shadow copies with capabilities for evasion, persistence, and file extraction.

Visit website
Compare
Compare
0
MCPThe entire cybersecurity market, one prompt awayTry MCP Access

Vshadow Description

Vshadow (vshadow.exe) is a command line utility for managing volume shadow copies included within the Windows SDK and signed by Microsoft. It allows for executing scripts and invoking commands in support of volume shadow snapshot management, which can be abused for privileged-level evasion, persistence, and file extraction. The tool supports the -exec parameter for executing binaries or scripts without command arguments.

Vshadow FAQ

Common questions about Vshadow including features, pricing, alternatives, and user reviews.

Vshadow is A command line utility for managing volume shadow copies with capabilities for evasion, persistence, and file extraction.. It is a Security Operations solution designed to help security teams with Windows, Persistence.

Have more questions? Browse our categories or search for specific tools.

ALTERNATIVES

PowerSploit Logo

PowerSploit is a PowerShell-based penetration testing framework containing modules for code execution, injection techniques, persistence, and various offensive security operations.

0
DiskShadow Logo

A tool that exposes the functionality of the Volume Shadow Copy Service (VSS) for creation, enumeration, and manipulation of volume shadow copies, with features for persistence and evasion.

0
checkra1n Logo

Semi-tethered jailbreak for iPhone 5s to iPhone X, running iOS 12.0 and up, using the 'checkm8' bootrom exploit.

0
SharpAppLocker Logo

SharpAppLocker is a C# tool that retrieves AppLocker application control policies from Windows systems, replicating the Get-AppLockerPolicy PowerShell cmdlet functionality.

0
Darkarmour Logo

Darkarmour is an open-source Windows antivirus evasion framework that enables security professionals to bypass antivirus detection through customizable obfuscation and anti-analysis techniques.

0

Stay Updated with Mandos Brief

Get strategic cybersecurity insights in your inbox