Finshir Logo

Finshir

0
Free
Visit Website

You are seeing a high-performant, coroutines-driven, and fully customisable implementation of Low & Slow load generator designed for real-world pentesting. Its complete undetectability is achieved by connecting through Tor. Contents - Features - Installation - Building from crates.io - Building from sources - Pre-compiled binaries - Options Overview - Minimal command - Using the Tor network - Test intensity - Connections count - Custom data portions - Logging options - Gallery - Initialisation - Errors - Being verbose - Contributing - Target platform - Legal disclaimer Features - Coroutines-driven. Finshir uses coroutines (also called lightweight threads) instead of ordinary threads, which lets you open many more connections with fewer system resources. - Generic. Unlike other Low & Slow utilities, Finshir lets you transmit arbitrary data sets over the TCP protocol. It may be partial HTTP headers, empty spaces, and so on. - Written in Rust. All the logic is written completely in Rust, leveraging bare-metal performance and high-level safety (no SIGSEGV, SIGILL, and other 'funny' stuff). Installation - Currently, this

FEATURES

ALTERNATIVES

Small script to simplify format string exploitation.

C3 is a framework for creating custom C2 channels, integrating with existing offensive toolkits.

A blog post about abusing exported functions and exposed DCOM interfaces for pass-thru command execution and lateral movement

A lightweight and portable Docker container for penetration testers and CTF players

CTF toolkit for rapid exploit development and prototyping.

A tool for Local File Inclusion (LFI) exploitation and scanning

A penetration testing framework for identifying and exploiting vulnerabilities.

A collection of Microsoft PowerShell modules for penetration testing purposes.