Shadower
A C2 environment with Controlled ransomware functional simulations.
Install / Use
/learn @diljith369/ShadowerREADME
███████╗██╗ ██╗ █████╗ ██████╗ ██████╗ ██╗ ██╗██████╗ ██████╗
██╔════╝██║ ██║██╔══██╗██╔══██╗██╔═████╗██║ ██║╚════██╗██╔══██╗
███████╗███████║███████║██║ ██║██║██╔██║██║ █╗ ██║ █████╔╝██████╔╝
╚════██║██╔══██║██╔══██║██║ ██║████╔╝██║██║███╗██║ ╚═══██╗██╔══██╗
███████║██║ ██║██║ ██║██████╔╝╚██████╔╝╚███╔███╔╝██████╔╝██║ ██║
╚══════╝╚═╝ ╚═╝╚═╝ ╚═╝╚═════╝ ╚═════╝ ╚══╝╚══╝ ╚═════╝ ╚═╝ ╚═╝
C2 environment with Controlled ransomware functional simulations. Automated process of generating C2 agents with Remote reflector loading option that limits forensic analysis of agent binary.
Things to note
Provide your C2 server IP / Domain first.
Build agent with Reflect Loader option. Provide your loader server path where you are going to keep the agent created.
Dont forget to provide remote loader agent name too. This remote agent is responsible for loading the agent remotely using reflection.
Things to note : cmd and ps options are noisy , new processes will be created when using cmd and ps.
To encrypt files use enc command : enc file(s)path,.,false - encrypts all files in the specified folder and do not change desktop wallpaper (setting final parameter true will make changes to desktop wall paper if the user has enough permissions to perform it)
Other notable commands
pwd , screencount, getscreen <screennumber>, listdir <PathToParentDirectory> , listfiles <PathToParentDirectory>

