event-generator Logo

event-generator

0
Free
Visit Website

Generate a variety of suspect actions that are detected by Falco rulesets. Warning — We strongly recommend that you run the program within Docker (see below), since some commands might alter your system. For example, some actions modify files and directories below /bin, /etc, /dev, etc. Make sure you fully understand what is the purpose of this tool before running any action. Notice — From version v0.11.0 the event-generator requires Falco 0.37.0 or newer. Previous versions of the event-generator might be compatible with older versions of Falco, however, we do not guarantee it. Usage The full command line documentation is here.

FEATURES

ALTERNATIVES

A suite of tools for Wi-Fi network security assessment and penetration testing.

A tool to dump login passwords from Linux desktop users, leveraging cleartext credentials in memory.

GraphSpy is a token management tool that allows users to store and manage access and refresh tokens for multiple users and scopes in one location.

A standalone man-in-the-middle attack framework used for phishing login credentials and bypassing 2-factor authentication.

A tutorial on how to use Apache mod_rewrite to randomly serve payloads in phishing attacks

Kali Linux is a specialized Linux distribution for cybersecurity professionals, focusing on penetration testing and security auditing.

A blog post discussing the often overlooked dangers of CSV injection in applications.

Python Exploit Development Assistance for GDB with enhanced debugging features and commands for exploit development.