phosphore / BURNLinks
[WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles π₯ (For Research Only)
β14Updated 8 years ago
Alternatives and similar repositories for BURN
Users that are interested in BURN are comparing it to the libraries listed below
Sorting:
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for upβ¦β48Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Toolβ26Updated 8 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploitβ¦β39Updated 9 years ago
- A modular pentesting framework implemented in Cβ14Updated 7 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB β¦β22Updated 5 years ago
- ssh session type for metasploitβ100Updated 2 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Useβ¦β18Updated 7 years ago
- β29Updated 8 years ago
- Local enumeration and exploitation framework.β18Updated 8 years ago
- collection of useful shells for penetration testsβ37Updated 8 years ago
- 0x88 exploit pack Decodedβ28Updated 11 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shellβ16Updated 11 years ago
- Supermicro IPMI/BMC Cleartext Password Scannerβ40Updated 10 years ago
- Multithreaded DNS recursive host brute-force toolβ13Updated 10 years ago
- β23Updated 7 years ago
- A tool to help you manage your leaksβ34Updated 7 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive argumentsβ33Updated 3 years ago
- Searches for interesting cached DNS entries.β55Updated 11 years ago
- Honeypot for router backdoor (TCP 32764)β19Updated 11 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmailβ36Updated 4 years ago
- NSA EquationGroup C&C Hunter using the Shodan APIβ29Updated 10 years ago
- Format string exploit generationβ10Updated 10 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.β131Updated 11 years ago
- Automated script to search in SMB protocol for availables pipe namesβ23Updated 7 years ago
- SQL Injection without the pain of syringes.β25Updated 8 years ago
- Arp spoof detection toolβ25Updated 8 years ago
- PowerShell Module Bindings for Capstone/Keystoneβ25Updated 8 years ago
- Tool for automation of GUI-based testing.β16Updated 10 years ago
- Hasher is designed to be a tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. Notβ¦β52Updated 3 years ago
- Automatically parses and attacks BloodHound-generated graphsβ41Updated 7 years ago