Fingerprint-aware TLS reverse proxy. Use Finch to outsmart bad traffic—collect client fingerprints (JA3, JA4 +QUIC, JA4H, HTTP/2) and act on them: block, reroute, tarpit, or deceive in real time.
☆293Dec 6, 2025Updated 5 months ago
Alternatives and similar repositories for finch
Users that are interested in finch are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆61Jul 13, 2025Updated 9 months ago
- .NET tool used to enrich RPC telemetry☆102Jan 24, 2026Updated 3 months ago
- LinkedIn recon the easy way☆110Jul 3, 2025Updated 10 months ago
- Make your programs stealthier🐝☆204Jun 12, 2025Updated 10 months ago
- The terminal automation framework☆44May 28, 2025Updated 11 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- MuonFP is an enterprise ready, TCP passive fingerprinter written in Rust that has no external dependencies such as WireShark or other ope…☆29Mar 27, 2026Updated last month
- SCEP request tool for AD CS and Intune☆76Oct 24, 2025Updated 6 months ago
- Go (formerly PowerShell) collector for adding MSSQL attack paths to BloodHound with OpenGraph☆317Apr 23, 2026Updated 2 weeks ago
- A tool to interact with Windows drivers to perform a raw disk read and parse out target files without calling standard Windows file APIs☆109Sep 4, 2025Updated 8 months ago
- A simple tool to identify WDS servers in Active Directory☆32Aug 25, 2025Updated 8 months ago
- Fragtunnel is a proof-of-concept (PoC) TCP tunnel tool that you can use to tunnel your application's traffic and bypass next-generation f…☆222Jun 4, 2024Updated last year
- single-threaded event driven sleep obfuscation poc for linux☆38Jun 14, 2025Updated 10 months ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆94Jan 14, 2026Updated 3 months ago
- Did you contain the compromised identity? notyet☆40Updated this week
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- macOS persistence mechanism scanner with code signature verification and timeline tracking.☆232Apr 28, 2026Updated last week
- Data about all known supply-chain attacks through history☆66May 28, 2025Updated 11 months ago
- A powerful shell script for creating custom WSL (Windows Subsystem for Linux) distributions with embedded payloads.☆72Nov 16, 2025Updated 5 months ago
- Fast Windows post-exploitation wins after initial access.☆29Jan 28, 2026Updated 3 months ago
- Repo hacks☆21Dec 7, 2025Updated 5 months ago
- SetupHijack is a security research tool that exploits race conditions and insecure file handling in Windows applications installer and up…☆263Feb 2, 2026Updated 3 months ago
- gubble is a tool designed to audit Google Workspace group settings. It analyzes settings such as who can join, view membership, post mess…☆84May 27, 2025Updated 11 months ago
- Living Under the Land on Linux ~ Bsides Belfast/Vienna 2025☆38Nov 22, 2025Updated 5 months ago
- Demo code JavaScript POC that tricks user into sending Windows hash to responder☆37Dec 12, 2025Updated 4 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Establishes mutually trusted TLS connections based on a pre-shared connection key.☆51Mar 21, 2024Updated 2 years ago
- Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephe…☆563Oct 3, 2025Updated 7 months ago
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆151Aug 26, 2024Updated last year
- Two tools written in C that block network traffic for blacklisted EDR processes, using either Windows Defender Firewall (WDF) or Windows …☆267Sep 23, 2025Updated 7 months ago
- Persist like a Dodder☆68May 19, 2025Updated 11 months ago
- Linux kernel integrity monitor for detecting syscall hooking☆85Feb 16, 2026Updated 2 months ago
- AutoRMM is a collection of scripts and instructions we are organizing, to test delivery mechanisms for RMM and screen sharing tools, alo…☆92Aug 3, 2025Updated 9 months ago
- ☆61Oct 24, 2024Updated last year
- Nginx module that calcuates fingerprints from the JA4+ suite☆109Apr 20, 2026Updated 2 weeks ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Python alternative to Mimikatz lsadump::dcshadow☆161Jun 24, 2025Updated 10 months ago
- Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.☆174Updated this week
- This is a list of currently known hidden pages within NETGEAR routers, switches, and other networking equipment. Why hidden? Ask Netgear.☆23Apr 13, 2026Updated 3 weeks ago
- Galah: An LLM-powered web honeypot.☆644Jul 24, 2025Updated 9 months ago
- AWS Testing and Reporting Management Tool☆20Jan 23, 2023Updated 3 years ago
- POC tool to abuse windows server failover clusters☆56Aug 7, 2025Updated 9 months ago
- Group Policy Objects manipulation and exploitation framework☆304Dec 7, 2025Updated 5 months ago