Inceptor is a template-driven framework designed to evade Anti-Virus (AV) and Endpoint Detection and Response (EDR) solutions, allowing users to create custom evasion techniques and test the effectiveness of their security controls. The framework provides a modular architecture, enabling users to easily create and modify templates to evade detection. Inceptor's goal is to help security professionals and researchers improve their defenses by identifying vulnerabilities and weaknesses in their security posture. With Inceptor, users can create custom templates to evade detection, test their security controls, and improve their overall security posture.
FEATURES
ALTERNATIVES
A cross-platform tool for creating malicious MS Office documents with hidden VBA macros and anti-analysis features.
Redboto is a collection of scripts for red team operations against the AWS API.
A collection of resources for practicing penetration testing
A collection of tests for Local File Inclusion (LFI) vulnerabilities using Burp Suite.
A macOS Initial Access Payload Generator for penetration testing and red teaming exercises.
Open-source project for building instrumented environments to simulate attacks and test detections.
A script to enumerate Google Storage buckets and determine access and privilege escalation
PINNED
Fabric Platform by BlackStork
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Mandos Brief Newsletter
Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.
Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
Adversa AI
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.