Finshir Logo

Finshir

0
Free
Visit Website

You are seeing a high-performant, coroutines-driven, and fully customisable implementation of Low & Slow load generator designed for real-world pentesting. Its complete undetectability is achieved by connecting through Tor. Contents - Features - Installation - Building from crates.io - Building from sources - Pre-compiled binaries - Options Overview - Minimal command - Using the Tor network - Test intensity - Connections count - Custom data portions - Logging options - Gallery - Initialisation - Errors - Being verbose - Contributing - Target platform - Legal disclaimer Features - Coroutines-driven. Finshir uses coroutines (also called lightweight threads) instead of ordinary threads, which lets you open many more connections with fewer system resources. - Generic. Unlike other Low & Slow utilities, Finshir lets you transmit arbitrary data sets over the TCP protocol. It may be partial HTTP headers, empty spaces, and so on. - Written in Rust. All the logic is written completely in Rust, leveraging bare-metal performance and high-level safety (no SIGSEGV, SIGILL, and other 'funny' stuff). Installation - Currently, this

FEATURES

ALTERNATIVES

CredMaster enhances password spraying tactics with IP rotation to maintain anonymity and efficiency.

An exploitation framework for industrial security with modules for controlling PLCs and scanning devices.

A Python library for exploiting race conditions in web apps

Utilizing Alternate Data Streams (ADS) to bypass AppLocker default policies by loading DLL/CPL binaries.

An AI-powered penetration testing platform that autonomously discovers, exploits, and documents vulnerabilities while generating NIST-compliant reports.

Automatic SSRF fuzzer and exploitation tool

A tool to dump login passwords from Linux desktop users, leveraging cleartext credentials in memory.

Weaponize Word documents with PowerShell Empire using the Microsoft DDE exploit.

PINNED