A compact, auditable C2 platform for ethical red‑team simulations, owner‑device security tracking, and precision remote interaction.
Unified inventory, tags, and health telemetry for endpoints you own or are authorized to test.
Push modular tasks, collect results, and rotate keys. Fully logged, fully reversible.
mTLS, short‑lived tokens, and operator MFA. Audit trails by default.
Simulate realistic intrusion chains under contract; prove detections without harm.
Device provenance checks and consent gates ensure ShellGames is used ethically.
Optional links to Canary for crisis messaging and JEM for operator rewards.
ShellGames is for authorized security work only. Operators attest ownership or written consent before enrollment. All actions are logged, reversible where possible, and bound by ROE.