Finshir Logo

Finshir

0
Free
Visit Website

You are seeing a high-performant, coroutines-driven, and fully customisable implementation of Low & Slow load generator designed for real-world pentesting. Its complete undetectability is achieved by connecting through Tor. Contents - Features - Installation - Building from crates.io - Building from sources - Pre-compiled binaries - Options Overview - Minimal command - Using the Tor network - Test intensity - Connections count - Custom data portions - Logging options - Gallery - Initialisation - Errors - Being verbose - Contributing - Target platform - Legal disclaimer Features - Coroutines-driven. Finshir uses coroutines (also called lightweight threads) instead of ordinary threads, which lets you open many more connections with fewer system resources. - Generic. Unlike other Low & Slow utilities, Finshir lets you transmit arbitrary data sets over the TCP protocol. It may be partial HTTP headers, empty spaces, and so on. - Written in Rust. All the logic is written completely in Rust, leveraging bare-metal performance and high-level safety (no SIGSEGV, SIGILL, and other 'funny' stuff). Installation - Currently, this

FEATURES

ALTERNATIVES

A modular and script-friendly multithread bruteforcer for managing task parameters in Python scripts.

An open source network penetration testing framework with automatic recon and scanning capabilities.

A structured approach for conducting penetration tests with seven main sections covering all aspects of the test.

A collection of tips and tricks for container and container orchestration hacking

Collection of Return-Oriented Programming challenges for practicing exploitation skills.

A tool for recursively querying webservers

DueDLLigence is an open-source tool for identifying and analyzing DLL hijacking vulnerabilities in Windows applications, providing automated analysis and remediation guidance.

A standalone man-in-the-middle attack framework used for phishing login credentials and bypassing 2-factor authentication.