All notable changes to this project will be documented in this file.
- Advanced Network Pivoting: Agents can now act as robust gateways into deeply segmented internal networks, breaking out of the initial compromised subnet.
- SOCKS5 Proxy Integration: Dynamically turn any active agent into a SOCKS5 proxy. This allows operators to route external offensive tools (Nmap, Metasploit, BloodHound, etc.) directly through the implant into the target network.
- Port Forwarding: Seamlessly bind local C2 ports to remote services (RDP, SMB, SSH, etc.) that are hidden behind internal firewalls and DMZs.
- Custom Multiplexer: Built a new concurrent connection handler to manage multiple parallel pivot sessions over a single agent heartbeat, ensuring the core execution thread never freezes.
- Encrypted Lateral Movement: All pivoted and proxied traffic is automatically tunneled and wrapped inside the existing AES-256-GCM C2 channel. Deep packet inspection (DPI) will only see standard C2 chatter, completely masking your internal lateral movement.
- Socket Exhaustion Panic: Fixed a critical bug where rapidly opening and closing proxied SOCKS5 connections caused the agent to panic, crash, and drop the session.
- Task Timeout Interference: Resolved an issue where an active, heavy pivot session (e.g., tunneling RDP) would delay or timeout other standard C2 commands (like
screenshotorupload) running in the background.
- End-to-End Encryption (E2EE): All Agent-to-C2 communication (heartbeats and task results) is now fully encrypted using AES-256-GCM. The framework no longer transmits plain JSON payloads, successfully neutralizing static network analysis, DPI, and basic IDS/IPS signatures.
- Remote Self-Update Mechanism: Introduced the highly requested
update <URL>command. Agents can now silently download a new binary from a hosted URL, gracefully replace their current running executable on disk (using a.oldbackup method), and restart without dropping the C2 session. - Deterministic Agent Fingerprinting: Agent IDs are no longer randomized on every startup. Implemented an MD5-based persistent fingerprinting system (
Hostname + Username) to ensure unique and stable identities across system reboots and agent crashes. - Smart Reconnection Alerts: The C2 server now tracks agent states dynamically. It silently logs regular heartbeats to keep the operator's console clean, but triggers a
[+] AGENT RECONNECTEDvisual alert if an agent returns after being offline or dead for >15 seconds.
- Exfiltration Bug (404 Error): Fixed a critical routing bug where the C2 HTTP listener lacked the
/uploadendpoint, which previously caused thescreenshotanduploadmodules to fail. - Duplicate/Zombie Agents: Resolved an issue where a single restarting agent would spam the database with multiple duplicate entries due to randomized ID generation.
- Console Spoil: Fixed the UI flooding issue in Shadow-Shell. Heartbeats are now processed strictly in the background unless a significant state change occurs.
First public release of ShadowLine, a modern, stealthy, and modular C2 framework designed for Red Team operations.
- Cross-Platform Agents: Full support for Windows, Linux, and macOS targets.
- Resilient Infrastructure: Implemented "Dead Drop" resolution via GitHub Gists and encrypted tunneling via Ngrok.
- Stealth: Added Ghost Mode (hidden window) and Fake Error Message for social engineering on Windows.
- Persistence: Registry (Windows) and Crontab (Linux/Mac) integration for auto-start.
- Command: Remote Shell execution.
- File I/O: Upload and Download capabilities.
- Surveillance: Screenshot capture.