Known tools leave familiar footprints, but when they surface inside a live C2 mesh,
the echoes change shape — and the signal becomes intelligence.
Purpose
This package contains sanitized traces and echoes of observed entities | domains, UUIDs, processes, and signature strings | directly linked to confirmed command-and-control activity.
All data here is metadata only. No raw logs, PCAPs, or sensitive artifacts are included. ShadowShells acts as a watchtower, cataloging and guiding detection of hostile infrastructure.
Intended Use
Ingest iocs.csv into monitoring tooling, SIEM rules, DNS tracking, or threat-hunting routines.
Apply blocklist.csv for defensive blocking or sinkholing.
Consult key hits.txt to track behaviors or patterns: shell anomalies, proxy/tunnel strings, beacon pulses.