programming.dev
  • Communities
  • Create Post
  • Create Community
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
digicat@infosec.pubM to blueteamsec@infosec.pubEnglish · 1 day ago

ShadowHS: A Fileless Linux Post‑Exploitation Framework Built on a Weaponized hackshell

cyble.com

external-link
message-square
0
link
fedilink
3
external-link

ShadowHS: A Fileless Linux Post‑Exploitation Framework Built on a Weaponized hackshell

cyble.com

digicat@infosec.pubM to blueteamsec@infosec.pubEnglish · 1 day ago
message-square
0
link
fedilink
Shadowhs-fileless-linux-post-exploitation-framework
cyble.com
external-link
Cyble uncovered ShadowHS, a stealthy fileless Linux framework running entirely in memory for covert, adaptive post‑exploitation control.
alert-triangle
You must log in or # to comment.

blueteamsec@infosec.pub

blueteamsec@infosec.pub

Subscribe from Remote Instance

Create a post
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: [email protected]

For [Blue|Purple] Teams in Cyber Defence - covering discovery, detection, response, threat intelligence, malware, offensive tradecraft and tooling, deception, reverse engineering etc.

Visibility: Public
globe

This community can be federated to other instances and be posted/commented in by their users.

  • 52 users / day
  • 76 users / week
  • 273 users / month
  • 897 users / 6 months
  • 13 local subscribers
  • 605 subscribers
  • 2.21K Posts
  • 165 Comments
  • Modlog
  • mods:
  • digicat@infosec.pub
  • BE: 0.19.13
  • Modlog
  • Legal
  • Instances
  • Docs
  • Code
  • join-lemmy.org