Mortar is an evasion technique designed to defeat and divert detection and prevention of security products, including Antivirus (AV), Endpoint Detection and Response (EDR), and Extended Detection and Response (XDR) solutions. It provides a framework for evading detection by security products, allowing for more effective penetration testing and red teaming exercises. Mortar's evasion techniques are designed to bypass security controls, enabling testers to identify vulnerabilities and weaknesses in an organization's defenses. The tool is intended for use by authorized security professionals and penetration testers, and should only be used with proper authorization and in accordance with applicable laws and regulations. By using Mortar, security professionals can simulate real-world attacks, identify vulnerabilities, and improve the overall security posture of an organization.
FEATURES
ALTERNATIVES
An exploration of a new method to abuse DCOM for remote payload execution and lateral movement.
Open-source Java application for creating proxies for traffic analysis & modification.
Offensive security tool for reconnaissance and information gathering with a wide range of features and future roadmap.
Back-end component for red team operations with crucial design considerations.
A powerful enumeration tool for discovering assets and subdomains.
A penetration testing tool that focuses on web browser exploitation
PINNED

InfoSecHired
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Mandos Brief Newsletter
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Check Point CloudGuard WAF
A cloud-native web application and API security solution that uses contextual AI to protect against known and zero-day threats without signature-based detection.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.

Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.