ScareCrow Logo

ScareCrow

0
Free
Visit Website

ScareCrow is a payload creation framework designed to bypass Endpoint Detection and Response (EDR) systems. It provides a flexible and customizable way to create payloads that can evade detection by EDR solutions. The framework allows users to create payloads with various features, such as code obfuscation, anti-debugging techniques, and evasion of memory-based detection. ScareCrow also provides a range of plugins and modules to extend its functionality. ScareCrow is a powerful tool for penetration testers and red teamers, allowing them to simulate advanced threats and test the effectiveness of EDR solutions.

FEATURES

ALTERNATIVES

A script to enumerate Google Storage buckets and determine access and privilege escalation

A proxy aware C2 framework for penetration testing, red teaming, post-exploitation, and lateral movement with modular format and highly configurable payloads.

A tool for interacting with the MSBuild API, enabling malicious activities and evading detection.

Exploiting WordPress With Metasploit, containing 45 modules for exploits and auxiliaries.

A list of useful payloads and bypasses for Web Application Security.

Very vulnerable ARM/ARM64[AARCH64] application with various levels of vulnerabilities for exploitation training.

Generates shellcode that loads Windows payloads from memory and runs them with parameters.

A PoC tool for generating Excel files with embedded macros without using Excel.