phosphore / BURN
[WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles π₯ (For Research Only)
β14Updated 7 years ago
Alternatives and similar repositories for BURN:
Users that are interested in BURN are comparing it to the libraries listed below
- MalRecon - Basic Malware Reconnaissance and Analysis Toolβ26Updated 7 years ago
- Here comes the paintrain!β11Updated 8 years ago
- A set of compiled application restriction bypassesβ29Updated 8 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloadsβ13Updated 10 years ago
- Format string exploit generationβ10Updated 9 years ago
- A modular pentesting framework implemented in Cβ14Updated 6 years ago
- Tool for automation of GUI-based testing.β15Updated 10 years ago
- Simple mods to wpa_supplicant to allow more efficient online brutingβ18Updated 5 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.β13Updated 7 years ago
- Multithreaded DNS recursive host brute-force toolβ13Updated 9 years ago
- β10Updated 9 years ago
- Local enumeration and exploitation framework.β18Updated 7 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB β¦β22Updated 5 years ago
- β26Updated 4 years ago
- POC for IAT Parsing Payloadsβ47Updated 8 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Useβ¦β18Updated 7 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Executionβ35Updated 8 years ago
- Mobile Application Vulnerability Detectionβ12Updated 7 years ago
- A tool to help you manage your leaksβ34Updated 7 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.β27Updated 7 years ago
- PowerShell Empire module for logging USB keystrokes via ETWβ31Updated 8 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploitβ¦β38Updated 9 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shellβ16Updated 10 years ago
- β24Updated 6 years ago
- Tool to identify all domains contained in an IP anonymouslyβ15Updated 7 years ago
- PowerShell Module Bindings for Capstone/Keystoneβ24Updated 8 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for crackingβ12Updated 10 years ago
- Fuzzing Frameworkβ10Updated 7 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.β26Updated 10 years ago
- Phishing Toolkitβ20Updated 7 years ago