event-generator Logo

event-generator

0
Free
Visit Website

Generate a variety of suspect actions that are detected by Falco rulesets. Warning — We strongly recommend that you run the program within Docker (see below), since some commands might alter your system. For example, some actions modify files and directories below /bin, /etc, /dev, etc. Make sure you fully understand what is the purpose of this tool before running any action. Notice — From version v0.11.0 the event-generator requires Falco 0.37.0 or newer. Previous versions of the event-generator might be compatible with older versions of Falco, however, we do not guarantee it. Usage The full command line documentation is here.

FEATURES

ALTERNATIVES

A Python library for exploiting race conditions in web apps

Maintaining account persistence via XSS and Oauth

Create a vulnerable active directory for testing various Active Directory attacks.

PwnAuth is an open-source tool for generating and managing authentication tokens for penetration testing and red teaming exercises.

A modern post-exploitation command and control framework with a client-server architecture and extensibility features.

A tool for performing hash length extension attacks against multiple hashing algorithms.

Customize Empire's GET request URIs, user agent, and headers for evading detection and masquerading as other applications.

A practical guide on NTLM relaying for Active Directory attacks.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved