phosphore / BURN
[WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles π₯ (For Research Only)
β14Updated 7 years ago
Alternatives and similar repositories for BURN:
Users that are interested in BURN are comparing it to the libraries listed below
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloadsβ13Updated 9 years ago
- RExploit (Router Exploitation) is a tool that search exploits for any router SOHO. It is written on Python and QT.β24Updated 8 years ago
- Tool for automation of GUI-based testing.β15Updated 10 years ago
- A modular pentesting framework implemented in Cβ14Updated 6 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.β27Updated 7 years ago
- Automatically parses and attacks BloodHound-generated graphsβ41Updated 6 years ago
- Simple mods to wpa_supplicant to allow more efficient online brutingβ18Updated 5 years ago
- β15Updated last year
- MalRecon - Basic Malware Reconnaissance and Analysis Toolβ26Updated 7 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmailβ36Updated 3 years ago
- SQL Injection without the pain of syringes.β25Updated 7 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB β¦β22Updated 4 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skillsβ21Updated 7 years ago
- Squirtle the Browser-based NTLM Attack Toolkitβ18Updated 9 years ago
- β29Updated 8 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploitβ¦β38Updated 8 years ago
- Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devicesβ22Updated 7 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.β25Updated 6 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Useβ¦β18Updated 6 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugsβ23Updated 5 years ago
- XSS payload designed to steal LastPass users' credentialsβ16Updated 10 years ago
- Gmail Knockerβ21Updated 7 years ago
- Multithreaded DNS recursive host brute-force toolβ13Updated 9 years ago
- Framework for Making Environmental Keyed Payloadsβ12Updated 8 years ago
- A set of compiled application restriction bypassesβ29Updated 7 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Executionβ35Updated 7 years ago