phosphore / BURNLinks
[WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles π₯ (For Research Only)
β13Updated 8 years ago
Alternatives and similar repositories for BURN
Users that are interested in BURN are comparing it to the libraries listed below
Sorting:
- A modular pentesting framework implemented in Cβ13Updated 7 years ago
- GUI Tool to generate threat intelligence information in various formatsβ44Updated 7 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloadsβ14Updated 10 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmailβ37Updated 4 years ago
- Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devicesβ22Updated 8 years ago
- Supermicro IPMI/BMC Cleartext Password Scannerβ40Updated 10 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Toolβ26Updated 8 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploitβ¦β38Updated 9 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB β¦β22Updated 5 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for upβ¦β49Updated 8 years ago
- Framework for Making Environmental Keyed Payloadsβ13Updated 9 years ago
- ssh session type for metasploitβ101Updated 2 years ago
- Automatically get internetz from access points that have MAC based filtering enabledβ57Updated 7 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.β132Updated 12 years ago
- Automatically parses and attacks BloodHound-generated graphsβ42Updated 7 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.β29Updated 3 years ago
- β65Updated 9 years ago
- hemingway is a simple and easy to use spear phishing helper.β42Updated 9 years ago
- PHP Phishing Frameworkβ28Updated 12 years ago
- Example ASM code following SLAE course and exam assignments.β36Updated 8 years ago
- A tool for fuzzing for ports that allow outgoing connectionsβ17Updated 7 years ago
- Tool for automation of GUI-based testing.β16Updated 11 years ago
- My metasploit modulesβ24Updated 10 years ago
- The Python Password-Protected Obfuscatorβ33Updated 6 years ago
- β15Updated 2 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Useβ¦β26Updated 7 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skillsβ21Updated 8 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generatorβ13Updated 9 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive argumentsβ33Updated 3 years ago
- My public exploit collection.β31Updated 7 years ago