phosphore / BURNLinks
[WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles π₯ (For Research Only)
β13Updated 8 years ago
Alternatives and similar repositories for BURN
Users that are interested in BURN are comparing it to the libraries listed below
Sorting:
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploitβ¦β38Updated 9 years ago
- A modular pentesting framework implemented in Cβ13Updated 7 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloadsβ14Updated 10 years ago
- Automatically parses and attacks BloodHound-generated graphsβ42Updated 7 years ago
- PHP Phishing Frameworkβ28Updated 12 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for upβ¦β49Updated 8 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmailβ37Updated 4 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Toolβ26Updated 8 years ago
- Supermicro IPMI/BMC Cleartext Password Scannerβ40Updated 10 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB β¦β22Updated 5 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.β18Updated 12 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and aβ¦β31Updated 2 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.β29Updated 3 years ago
- Local enumeration and exploitation framework.β18Updated 8 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports andβ¦β55Updated 8 years ago
- Automated script to search in SMB protocol for availables pipe namesβ24Updated 7 years ago
- ssh session type for metasploitβ101Updated 3 years ago
- hemingway is a simple and easy to use spear phishing helper.β42Updated 9 years ago
- The Python Password-Protected Obfuscatorβ33Updated 6 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skillsβ21Updated 8 years ago
- A tool to help you manage your leaksβ34Updated 8 years ago
- 0x88 exploit pack Decodedβ27Updated 11 years ago
- Phishing Toolkitβ19Updated 7 years ago
- Framework for Making Environmental Keyed Payloadsβ13Updated 9 years ago
- mOrc is a post-exploitation framework for macOS written in Bashβ19Updated 2 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.β23Updated 7 years ago
- GUI Tool to generate threat intelligence information in various formatsβ45Updated 8 years ago
- β26Updated 5 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwordsβ51Updated 8 years ago
- β10Updated 9 years ago