event-generator Logo

event-generator

0
Free
Updated 11 March 2025
Visit Website

Generate a variety of suspect actions that are detected by Falco rulesets. Warning — We strongly recommend that you run the program within Docker (see below), since some commands might alter your system. For example, some actions modify files and directories below /bin, /etc, /dev, etc. Make sure you fully understand what is the purpose of this tool before running any action. Notice — From version v0.11.0 the event-generator requires Falco 0.37.0 or newer. Previous versions of the event-generator might be compatible with older versions of Falco, however, we do not guarantee it. Usage The full command line documentation is here.

FEATURES

SIMILAR TOOLS

An AI-powered penetration testing platform that autonomously discovers, exploits, and documents vulnerabilities while generating NIST-compliant reports.

A covert channel technique that uses WebDAV protocol features to deliver malicious payloads and establish C2 communication while bypassing security controls.

A front-end JavaScript toolkit for creating DNS rebinding attacks

A specification/framework for extending default C2 communication channels in Cobalt Strike

Fast web spider written in Go

A collection of Python scripts for password spraying attacks against Lync/S4B & OWA, featuring Atomizer, Vaporizer, Aerosol, and Spindrift tools.

A tool for enumerating and attacking GitHub Actions pipelines

A quick and dirty dynamic redirect.rules generator for penetration testers and security professionals.

Covenant is a .NET C2 framework for red teamers, facilitating collaborative and efficient management of red team operations.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved