Finshir Logo

Finshir

0
Free
Visit Website

You are seeing a high-performant, coroutines-driven, and fully customisable implementation of Low & Slow load generator designed for real-world pentesting. Its complete undetectability is achieved by connecting through Tor. Contents - Features - Installation - Building from crates.io - Building from sources - Pre-compiled binaries - Options Overview - Minimal command - Using the Tor network - Test intensity - Connections count - Custom data portions - Logging options - Gallery - Initialisation - Errors - Being verbose - Contributing - Target platform - Legal disclaimer Features - Coroutines-driven. Finshir uses coroutines (also called lightweight threads) instead of ordinary threads, which lets you open many more connections with fewer system resources. - Generic. Unlike other Low & Slow utilities, Finshir lets you transmit arbitrary data sets over the TCP protocol. It may be partial HTTP headers, empty spaces, and so on. - Written in Rust. All the logic is written completely in Rust, leveraging bare-metal performance and high-level safety (no SIGSEGV, SIGILL, and other 'funny' stuff). Installation - Currently, this

FEATURES

ALTERNATIVES

A PowerShell toolkit for attacking Azure environments

A tool that simplifies the installation of tools and configuration for Kali Linux

Emulates Docker HTTP API with event logging and AWS deployment script.

A collection of resources for practicing penetration testing

Rip web accessible (distributed) version control systems: SVN, GIT, Mercurial/hg, bzr, ...

Python Exploit Development Assistance for GDB with enhanced debugging features and commands for exploit development.

A structured approach for conducting penetration tests with seven main sections covering all aspects of the test.

A visual guide illustrating attack paths and techniques for exploiting vulnerabilities in GitHub Actions configurations.