phosphore / BURNLinks
[WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles π₯ (For Research Only)
β14Updated 8 years ago
Alternatives and similar repositories for BURN
Users that are interested in BURN are comparing it to the libraries listed below
Sorting:
- Simple mods to wpa_supplicant to allow more efficient online brutingβ19Updated 5 years ago
- A modular pentesting framework implemented in Cβ14Updated 6 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloadsβ13Updated 10 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Useβ¦β18Updated 7 years ago
- GUI Tool to generate threat intelligence information in various formatsβ43Updated 7 years ago
- A tool for fuzzing for ports that allow outgoing connectionsβ18Updated 6 years ago
- β28Updated 8 years ago
- Automatically parses and attacks BloodHound-generated graphsβ41Updated 6 years ago
- β10Updated 9 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Toolβ26Updated 8 years ago
- β23Updated 7 years ago
- Faraday Workspaces for Bug Bountiesβ21Updated 9 years ago
- A tool to help you manage your leaksβ34Updated 7 years ago
- β15Updated 2 years ago
- Volatility Framework plugin to detect various types of hooks as performed by banking Trojansβ41Updated 6 years ago
- Format string exploit generationβ10Updated 9 years ago
- Local enumeration and exploitation framework.β18Updated 7 years ago
- A set of compiled application restriction bypassesβ29Updated 8 years ago
- β24Updated 6 years ago
- Framework for Making Environmental Keyed Payloadsβ13Updated 8 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skillsβ21Updated 8 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports andβ¦β53Updated 7 years ago
- SQL Injection without the pain of syringes.β25Updated 8 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmailβ36Updated 4 years ago
- Parses Java Cache IDX filesβ39Updated 7 years ago
- β18Updated last year
- Software exploitation training materialβ15Updated 8 years ago
- Get detailed information about a Twitter user activityβ17Updated 7 years ago
- Mobile Application Vulnerability Detectionβ12Updated 8 years ago
- Tool for automation of GUI-based testing.β15Updated 10 years ago