phosphore / BURNLinks
[WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles π₯ (For Research Only)
β14Updated 8 years ago
Alternatives and similar repositories for BURN
Users that are interested in BURN are comparing it to the libraries listed below
Sorting:
- A modular pentesting framework implemented in Cβ14Updated 6 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and aβ¦β31Updated 2 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploitβ¦β39Updated 9 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for upβ¦β48Updated 8 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Useβ¦β18Updated 7 years ago
- GUI Tool to generate threat intelligence information in various formatsβ43Updated 7 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloadsβ13Updated 10 years ago
- ssh session type for metasploitβ99Updated 2 years ago
- Multithreaded DNS recursive host brute-force toolβ13Updated 10 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Toolβ26Updated 8 years ago
- hemingway is a simple and easy to use spear phishing helper.β42Updated 8 years ago
- Hasher is designed to be a tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. Notβ¦β52Updated 3 years ago
- My metasploit modulesβ23Updated 9 years ago
- NSA EquationGroup C&C Hunter using the Shodan APIβ29Updated 10 years ago
- Automatically parses and attacks BloodHound-generated graphsβ41Updated 7 years ago
- This version touches disk for registry persistence.β26Updated 9 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB β¦β22Updated 5 years ago
- Execute shellcode and evade AV detection with python.β15Updated 9 years ago
- β15Updated 2 years ago
- collection of useful shells for penetration testsβ37Updated 8 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shellβ16Updated 11 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmailβ36Updated 4 years ago
- A tool for fuzzing for ports that allow outgoing connectionsβ18Updated 6 years ago
- Metasploit installer for Debian (Jessie) VPS.β25Updated 8 years ago
- Local enumeration and exploitation framework.β18Updated 7 years ago
- Collection of single use scripts I worte for windows forensicsβ27Updated 13 years ago
- β26Updated 5 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for crackingβ13Updated 11 years ago
- Automated script to search in SMB protocol for availables pipe namesβ23Updated 7 years ago
- Optional plugins for MITMfβ15Updated 10 years ago