ScareCrow is a payload creation framework designed to bypass Endpoint Detection and Response (EDR) systems. It provides a flexible and customizable way to create payloads that can evade detection by EDR solutions. The framework allows users to create payloads with various features, such as code obfuscation, anti-debugging techniques, and evasion of memory-based detection. ScareCrow also provides a range of plugins and modules to extend its functionality. ScareCrow is a powerful tool for penetration testers and red teamers, allowing them to simulate advanced threats and test the effectiveness of EDR solutions.
FEATURES
SIMILAR TOOLS
A digital archive of the internet, allowing users to capture and browse archived web pages.
Tool for enumerating proxy configurations and generating CobaltStrike-compatible shellcode.
SharpEDRChecker scans system components to detect security products and tools.
Interactive online malware sandbox for real-time analysis and threat intelligence
Kali Linux is a specialized Linux distribution for cybersecurity professionals, focusing on penetration testing and security auditing.
Generates randomized C2 profiles for Cobalt Strike to evade detection.
Explore the top million websites, ranked by referring subnets, and gain insights into online influence and popularity.
BeEF is a specialized penetration testing tool for exploiting web browser vulnerabilities to assess security.
A command that builds and executes command lines from standard input, allowing for the execution of commands with multiple arguments.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.