phosphore / BURNLinks
[WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles π₯ (For Research Only)
β14Updated 8 years ago
Alternatives and similar repositories for BURN
Users that are interested in BURN are comparing it to the libraries listed below
Sorting:
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploitβ¦β38Updated 9 years ago
- A modular pentesting framework implemented in Cβ14Updated 7 years ago
- GUI Tool to generate threat intelligence information in various formatsβ44Updated 7 years ago
- ssh session type for metasploitβ100Updated 2 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Toolβ26Updated 8 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloadsβ14Updated 10 years ago
- hemingway is a simple and easy to use spear phishing helper.β42Updated 9 years ago
- Supermicro IPMI/BMC Cleartext Password Scannerβ40Updated 10 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.β29Updated 3 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Useβ¦β18Updated 7 years ago
- Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devicesβ22Updated 8 years ago
- Get detailed information about a Twitter user activityβ17Updated 7 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for upβ¦β49Updated 8 years ago
- Searches for interesting cached DNS entries.β55Updated 11 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB β¦β22Updated 5 years ago
- Example ASM code following SLAE course and exam assignments.β36Updated 8 years ago
- Collection of single use scripts I worte for windows forensicsβ27Updated 13 years ago
- Automatically parses and attacks BloodHound-generated graphsβ41Updated 7 years ago
- PHP Phishing Frameworkβ28Updated 11 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.β131Updated 12 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports andβ¦β55Updated 8 years ago
- A python script for obfuscating wireless networksβ79Updated 9 years ago
- A short and small memory forensics helper.β53Updated 8 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network vβ¦β40Updated 10 years ago
- collection of useful shells for penetration testsβ37Updated 8 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will proβ¦β81Updated 12 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmailβ36Updated 4 years ago
- Framework for Making Environmental Keyed Payloadsβ13Updated 9 years ago
- The Python Password-Protected Obfuscatorβ33Updated 6 years ago
- Multithreaded DNS recursive host brute-force toolβ13Updated 10 years ago