Finshir Logo

Finshir

0
Free
Visit Website

You are seeing a high-performant, coroutines-driven, and fully customisable implementation of Low & Slow load generator designed for real-world pentesting. Its complete undetectability is achieved by connecting through Tor. Contents - Features - Installation - Building from crates.io - Building from sources - Pre-compiled binaries - Options Overview - Minimal command - Using the Tor network - Test intensity - Connections count - Custom data portions - Logging options - Gallery - Initialisation - Errors - Being verbose - Contributing - Target platform - Legal disclaimer Features - Coroutines-driven. Finshir uses coroutines (also called lightweight threads) instead of ordinary threads, which lets you open many more connections with fewer system resources. - Generic. Unlike other Low & Slow utilities, Finshir lets you transmit arbitrary data sets over the TCP protocol. It may be partial HTTP headers, empty spaces, and so on. - Written in Rust. All the logic is written completely in Rust, leveraging bare-metal performance and high-level safety (no SIGSEGV, SIGILL, and other 'funny' stuff). Installation - Currently, this

FEATURES

ALTERNATIVES

Python framework for building and utilizing interfaces to transfer data between frameworks with a focus on Command and Control frameworks.

A standard for conducting penetration tests, covering seven main sections from planning to reporting.

A guide to bypassing RFID card reader security mechanisms using specialized hardware

A C++ staged shellcode loader with evasion capabilities, compatible with Sliver and other shellcode sources, designed for offensive security testing.

Python Exploit Development Assistance for GDB with enhanced debugging features and commands for exploit development.

A set of YARA rules for identifying files containing sensitive information

Darkarmour is a Windows AV evasion tool that helps bypass antivirus software, allowing for the creation of undetectable malware.

Interactive online malware sandbox for real-time analysis and threat intelligence

PINNED