ScareCrow is a payload creation framework designed to bypass Endpoint Detection and Response (EDR) systems. It provides a flexible and customizable way to create payloads that can evade detection by EDR solutions. The framework allows users to create payloads with various features, such as code obfuscation, anti-debugging techniques, and evasion of memory-based detection. ScareCrow also provides a range of plugins and modules to extend its functionality. ScareCrow is a powerful tool for penetration testers and red teamers, allowing them to simulate advanced threats and test the effectiveness of EDR solutions.
FEATURES
SIMILAR TOOLS
A powerful penetration testing platform for identifying vulnerabilities and weaknesses in computer systems.
DueDLLigence is an open-source tool for identifying and analyzing DLL hijacking vulnerabilities in Windows applications, providing automated analysis and remediation guidance.
GNU/Linux Wireless distribution for security testing with XFCE desktop environment.
Tool for randomizing Cobalt Strike Malleable C2 profiles to evade static, signature-based detection controls.
Create a vulnerable active directory for testing various Active Directory attacks.
A login cracker that can be used to crack many types of authentication protocols.
PwnAuth is an open-source tool for generating and managing authentication tokens for penetration testing and red teaming exercises.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.