event-generator Logo

event-generator

0
Free
Visit Website

Generate a variety of suspect actions that are detected by Falco rulesets. Warning — We strongly recommend that you run the program within Docker (see below), since some commands might alter your system. For example, some actions modify files and directories below /bin, /etc, /dev, etc. Make sure you fully understand what is the purpose of this tool before running any action. Notice — From version v0.11.0 the event-generator requires Falco 0.37.0 or newer. Previous versions of the event-generator might be compatible with older versions of Falco, however, we do not guarantee it. Usage The full command line documentation is here.

FEATURES

ALTERNATIVES

A Linux-based environment for penetration testing and vulnerability exploitation

Chameleon aids in evading proxy categorization to bypass internet filters.

A lightweight and portable Docker container for penetration testers and CTF players

A DNS rebinding attack framework for security researchers and penetration testers.

Utilizing Alternate Data Streams (ADS) to bypass AppLocker default policies by loading DLL/CPL binaries.

Advanced command and control tool for red teaming and adversary simulation with extensive features and evasion capabilities.

A tool for detecting and taking over subdomains with dead DNS records

Tool for exploiting Sixnet RTUs to gain root level access with little effort.

PINNED