Fingerprint-aware TLS reverse proxy. Use Finch to outsmart bad traffic—collect client fingerprints (JA3, JA4 +QUIC, JA4H, HTTP/2) and act on them: block, reroute, tarpit, or deceive in real time.
☆291Dec 6, 2025Updated 3 months ago
Alternatives and similar repositories for finch
Users that are interested in finch are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆60Jul 13, 2025Updated 8 months ago
- .NET tool used to enrich RPC telemetry☆101Jan 24, 2026Updated 2 months ago
- Ebyte-Go-Morpher is a Go program that parses, analyzes, and rewrites Go source code to apply multiple layers of obfuscation. It operates …☆123Jul 19, 2025Updated 8 months ago
- LinkedIn recon the easy way☆110Jul 3, 2025Updated 8 months ago
- Make your programs stealthier🐝☆203Jun 12, 2025Updated 9 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- The terminal automation framework☆43May 28, 2025Updated 9 months ago
- MuonFP is an enterprise ready, TCP passive fingerprinter written in Rust that has no external dependencies such as WireShark or other ope…☆29Dec 12, 2025Updated 3 months ago
- SCEP request tool for AD CS and Intune☆74Oct 24, 2025Updated 5 months ago
- PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph☆295Mar 13, 2026Updated 2 weeks ago
- A tool to interact with Windows drivers to perform a raw disk read and parse out target files without calling standard Windows file APIs☆107Sep 4, 2025Updated 6 months ago
- A simple tool to identify WDS servers in Active Directory☆32Aug 25, 2025Updated 7 months ago
- Fragtunnel is a proof-of-concept (PoC) TCP tunnel tool that you can use to tunnel your application's traffic and bypass next-generation f…☆220Jun 4, 2024Updated last year
- macOS persistence mechanism scanner with code signature verification and timeline tracking.☆205Dec 20, 2025Updated 3 months ago
- single-threaded event driven sleep obfuscation poc for linux☆38Jun 14, 2025Updated 9 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Data about all known supply-chain attacks through history☆64May 28, 2025Updated 9 months ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆92Jan 14, 2026Updated 2 months ago
- A powerful shell script for creating custom WSL (Windows Subsystem for Linux) distributions with embedded payloads.☆72Nov 16, 2025Updated 4 months ago
- Fast Windows post-exploitation wins after initial access.☆29Jan 28, 2026Updated last month
- SetupHijack is a security research tool that exploits race conditions and insecure file handling in Windows applications installer and up…☆263Feb 2, 2026Updated last month
- Repo hacks☆21Dec 7, 2025Updated 3 months ago
- gubble is a tool designed to audit Google Workspace group settings. It analyzes settings such as who can join, view membership, post mess…☆83May 27, 2025Updated 10 months ago
- ☆10Mar 18, 2026Updated last week
- Living Under the Land on Linux ~ Bsides Belfast/Vienna 2025☆38Nov 22, 2025Updated 4 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Demo code JavaScript POC that tricks user into sending Windows hash to responder☆37Dec 12, 2025Updated 3 months ago
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆150Aug 26, 2024Updated last year
- Two tools written in C that block network traffic for blacklisted EDR processes, using either Windows Defender Firewall (WDF) or Windows …☆264Sep 23, 2025Updated 6 months ago
- Establishes mutually trusted TLS connections based on a pre-shared connection key.☆51Mar 21, 2024Updated 2 years ago
- This is a list of currently known hidden pages within NETGEAR routers, switches, and other networking equipment. Why hidden? Ask Netgear.☆18Feb 23, 2026Updated last month
- Persist like a Dodder☆68May 19, 2025Updated 10 months ago
- Linux kernel integrity monitor for detecting syscall hooking☆80Feb 16, 2026Updated last month
- AutoRMM is a collection of scripts and instructions we are organizing, to test delivery mechanisms for RMM and screen sharing tools, alo…☆92Aug 3, 2025Updated 7 months ago
- Nginx module that calcuates fingerprints from the JA4+ suite☆102Jan 31, 2026Updated last month
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆59Oct 24, 2024Updated last year
- Python alternative to Mimikatz lsadump::dcshadow☆161Jun 24, 2025Updated 9 months ago
- Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.☆171Mar 20, 2026Updated last week
- Galah: An LLM-powered web honeypot.☆642Jul 24, 2025Updated 8 months ago
- A cross-platform tool to parse and describe the contents of a raw ntSecurityDescriptor structure☆48Oct 4, 2025Updated 5 months ago
- AWS Testing and Reporting Management Tool☆20Jan 23, 2023Updated 3 years ago
- POC tool to abuse windows server failover clusters☆56Aug 7, 2025Updated 7 months ago