phosphore / BURN
[WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles π₯ (For Research Only)
β14Updated 7 years ago
Alternatives and similar repositories for BURN:
Users that are interested in BURN are comparing it to the libraries listed below
- A modular pentesting framework implemented in Cβ14Updated 6 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloadsβ13Updated 10 years ago
- Simple mods to wpa_supplicant to allow more efficient online brutingβ18Updated 5 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Toolβ26Updated 7 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.β27Updated 7 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugsβ23Updated 5 years ago
- GUI Tool to generate threat intelligence information in various formatsβ43Updated 7 years ago
- β10Updated 9 years ago
- β24Updated 6 years ago
- Mobile Application Vulnerability Detectionβ12Updated 7 years ago
- Local enumeration and exploitation framework.β18Updated 7 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB β¦β22Updated 5 years ago
- Automatically parses and attacks BloodHound-generated graphsβ41Updated 6 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skillsβ21Updated 8 years ago
- collection of useful shells for penetration testsβ37Updated 8 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmailβ36Updated 4 years ago
- A tool for fuzzing for ports that allow outgoing connectionsβ18Updated 6 years ago
- Framework for Making Environmental Keyed Payloadsβ13Updated 8 years ago
- β23Updated 7 years ago
- Wardriving ekopartyβ15Updated 7 years ago
- Multithreaded DNS recursive host brute-force toolβ13Updated 9 years ago
- Software exploitation training materialβ15Updated 7 years ago
- PHP Phishing Frameworkβ28Updated 11 years ago
- A set of compiled application restriction bypassesβ29Updated 8 years ago
- PowerShell Empire module for logging USB keystrokes via ETWβ31Updated 8 years ago
- β15Updated 2 years ago
- Squirtle the Browser-based NTLM Attack Toolkitβ17Updated 10 years ago
- Leveraging CVE-2018-19788 without root shellsβ19Updated 6 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploitβ¦β38Updated 9 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.β13Updated 7 years ago