Inceptor is a template-driven framework designed to evade Anti-Virus (AV) and Endpoint Detection and Response (EDR) solutions, allowing users to create custom evasion techniques and test the effectiveness of their security controls. The framework provides a modular architecture, enabling users to easily create and modify templates to evade detection. Inceptor's goal is to help security professionals and researchers improve their defenses by identifying vulnerabilities and weaknesses in their security posture. With Inceptor, users can create custom templates to evade detection, test their security controls, and improve their overall security posture.
FEATURES
ALTERNATIVES
Boofuzz is a network protocol fuzzing tool that aims to fuzz everything
A tool that exposes the functionality of the Volume Shadow Copy Service (VSS) for creation, enumeration, and manipulation of volume shadow copies, with features for persistence and evasion.
A practical guide on NTLM relaying for Active Directory attacks.
A login cracker that can be used to crack many types of authentication protocols.
A tool for interacting with Exchange servers remotely and exploiting client-side Outlook features.
A cheat sheet providing examples of creating reverse shells for penetration testing.
A credit card/magstripe spoofer that can emulate any magnetic stripe or credit card wirelessly.
Parrot Security OS is a comprehensive, secure, and customizable operating system for cybersecurity professionals, offering over 600+ tools and utilities for red and blue team operations.
PINNED

InfoSecHired
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Mandos Brief Newsletter
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Check Point CloudGuard WAF
A cloud-native web application and API security solution that uses contextual AI to protect against known and zero-day threats without signature-based detection.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.

Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.