gwen001 / offsectools_www

A vast collection of security tools and resources curated by the community.
https://offsec.tools
184 stars 23 forks source link

[addtool] shad0w #1942

Closed gwen001 closed 3 months ago

gwen001 commented 3 months ago

[tags]postexploitation,c2c[/tags] [short_descr]A post exploitation framework designed to operate covertly on heavily monitored environments.[/short_descr] [link] https://github.com/bats3c/shad0w [/link] [long_descr] It uses a range of methods to evade EDR and AV while allowing the operator to continue using tooling and tradecraft they are familiar with. Its powered by Python 3.8 and C, and uses Donut for payload generation. By using Donut along with the process injection capabilities of SHAD0W, it provides the operator the ability to execute .NET assemblies, DLLs, EXEs, JS, VBS or XSLs fully inside memory. Dynamically resolved syscalls are heavily used to avoid userland API hooking, anti DLL injection to make it harder for EDR to load code into the beacons and official Microsoft mitigation methods to protect spawn processes.

See the wiki for installation and usage instructions.

Main features of SHAD0W C2:

Main features of SHAD0W beacons:

Current Modules:

gwen001 commented 3 months ago

Issue correctly handled, tool is waiting for human validation.

gwen001 commented 3 months ago

Tool has been accepted by the team: https://offsec.tools/tool/shad0w

Thank you for your contribution!