Fingerprint-aware TLS reverse proxy. Use Finch to outsmart bad traffic—collect client fingerprints (JA3, JA4 +QUIC, JA4H, HTTP/2) and act on them: block, reroute, tarpit, or deceive in real time.
☆286Dec 6, 2025Updated 3 months ago
Alternatives and similar repositories for finch
Users that are interested in finch are comparing it to the libraries listed below
Sorting:
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆60Jul 13, 2025Updated 7 months ago
- .NET tool used to enrich RPC telemetry☆101Jan 24, 2026Updated last month
- Ebyte-Go-Morpher is a Go program that parses, analyzes, and rewrites Go source code to apply multiple layers of obfuscation. It operates …☆122Jul 19, 2025Updated 7 months ago
- LinkedIn recon the easy way☆110Jul 3, 2025Updated 8 months ago
- PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph☆292Feb 10, 2026Updated 3 weeks ago
- Data about all known supply-chain attacks through history☆63May 28, 2025Updated 9 months ago
- SCEP request tool for AD CS and Intune☆74Oct 24, 2025Updated 4 months ago
- Make your programs stealthier🐝☆202Jun 12, 2025Updated 8 months ago
- AWS Testing and Reporting Management Tool☆20Jan 23, 2023Updated 3 years ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆92Jan 14, 2026Updated last month
- A tool to interact with Windows drivers to perform a raw disk read and parse out target files without calling standard Windows file APIs☆107Sep 4, 2025Updated 6 months ago
- single-threaded event driven sleep obfuscation poc for linux☆38Jun 14, 2025Updated 8 months ago
- A powerful shell script for creating custom WSL (Windows Subsystem for Linux) distributions with embedded payloads.☆71Nov 16, 2025Updated 3 months ago
- Fragtunnel is a proof-of-concept (PoC) TCP tunnel tool that you can use to tunnel your application's traffic and bypass next-generation f …☆220Jun 4, 2024Updated last year
- SetupHijack is a security research tool that exploits race conditions and insecure file handling in Windows applications installer and up…☆262Feb 2, 2026Updated last month
- The terminal automation framework☆42May 28, 2025Updated 9 months ago
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆96Apr 2, 2025Updated 11 months ago
- Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.☆168Dec 7, 2025Updated 3 months ago
- macOS persistence mechanism scanner with code signature verification and timeline tracking.☆203Dec 20, 2025Updated 2 months ago
- gubble is a tool designed to audit Google Workspace group settings. It analyzes settings such as who can join, view membership, post mess…☆82May 27, 2025Updated 9 months ago
- Fast Windows post-exploitation wins after initial access.☆29Jan 28, 2026Updated last month
- Establishes mutually trusted TLS connections based on a pre-shared connection key.☆51Mar 21, 2024Updated last year
- ☆43Jul 17, 2025Updated 7 months ago
- Galah: An LLM-powered web honeypot.☆635Jul 24, 2025Updated 7 months ago
- SOCKS5 proxy tool that uses Azure Blob Storage as a means of communication.☆309Feb 16, 2026Updated 2 weeks ago
- Group Policy Objects manipulation and exploitation framework☆296Dec 7, 2025Updated 3 months ago
- ☆124May 12, 2021Updated 4 years ago
- Backdooring VSCode Projects☆126Jun 5, 2025Updated 9 months ago
- A simple tool to identify WDS servers in Active Directory☆32Aug 25, 2025Updated 6 months ago
- This is a list of currently known hidden pages within NETGEAR routers, switches, and other networking equipment. Why hidden? Ask Netgear.☆18Feb 23, 2026Updated last week
- ☆59Oct 24, 2024Updated last year
- Collection of BOFs for Cobalt Strike☆32Mar 28, 2023Updated 2 years ago
- Spotter is a comprehensive Kubernetes security scanner that uses CEL-based rules to identify security vulnerabilities, misconfigurations,…☆71Sep 13, 2025Updated 5 months ago
- C# DInvoke Shellcode Runner☆31Feb 10, 2025Updated last year
- Persist like a Dodder☆68May 19, 2025Updated 9 months ago
- Request device ticket/token using the device's MSA☆38Aug 25, 2025Updated 6 months ago
- Repo hacks☆21Dec 7, 2025Updated 3 months ago
- Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephe…☆502Oct 3, 2025Updated 5 months ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆23Sep 15, 2021Updated 4 years ago