ScareCrow is a payload creation framework designed to bypass Endpoint Detection and Response (EDR) systems. It provides a flexible and customizable way to create payloads that can evade detection by EDR solutions. The framework allows users to create payloads with various features, such as code obfuscation, anti-debugging techniques, and evasion of memory-based detection. ScareCrow also provides a range of plugins and modules to extend its functionality. ScareCrow is a powerful tool for penetration testers and red teamers, allowing them to simulate advanced threats and test the effectiveness of EDR solutions.
This tool is not verified yet and doesn't have listed features.
Did you submit the verified tool? Sign in to add features.
Are you the author? Claim the tool by clicking the icon above. After claiming, you can add features.
A C2 profile generator for Cobalt Strike designed to enhance evasion.
A cross-platform tool for creating malicious MS Office documents with hidden VBA macros and anti-analysis features.
Comprehensive host-survey tool for security checks in C#.
Using Apache mod_rewrite rules to rewrite incident responder or security appliance requests to an innocuous website or the target's real website.
FOCA is a tool used to find metadata and hidden information in scanned documents, with capabilities to analyze various file types and extract EXIF information.
Python-based toolkit for network hacking with various implemented techniques and supported by Securetia SRL.