LaZagne Project
Open source application for retrieving passwords stored on a local computer with support for various software and platforms.
Generate a variety of suspect actions that are detected by Falco rulesets. Warning — We strongly recommend that you run the program within Docker (see below), since some commands might alter your system. For example, some actions modify files and directories below /bin, /etc, /dev, etc. Make sure you fully understand what is the purpose of this tool before running any action. Notice — From version v0.11.0 the event-generator requires Falco 0.37.0 or newer. Previous versions of the event-generator might be compatible with older versions of Falco, however, we do not guarantee it. Usage The full command line documentation is here.
Open source application for retrieving passwords stored on a local computer with support for various software and platforms.
A collaborative, multi-platform, red teaming framework for simulating attacks and testing defenses.
A free, safe, and legal training ground for ethical hackers to test and expand their skills
A credit card/magstripe spoofer that can emulate any magnetic stripe or credit card wirelessly.
RTA provides a framework of scripts for blue teams to test detection capabilities against malicious tradecraft, modeled after MITRE ATT&CK.
Learn how to create new Malleable C2 profiles for Cobalt Strike to avoid detection and signatured toolset