A set of tools for generating disguised command variants, webshells, shellcode, and installers to test and improve security detection rules in defensive research.
How It Works
You hear about a handy toolbox from security friends that helps create sneaky test examples to check if your defenses spot hidden threats.
You download the simple files to your computer and prepare them for easy use.
Test disguises for regular system checks on Windows or Linux.
Create hidden web commands to see if site protectors notice.
Make test installers that look innocent to fool package scanners.
Type in a simple command you want to hide, and the tool instantly generates many clever disguised versions for testing.
Try your disguised examples against your security setup to see which ones slip through.
Spot the weaknesses and learn how to strengthen your detection rules.
Your security is now better at catching even the sneakiest threats, keeping everything safe.
Star Growth
Repurpose is a Pro feature
Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.
Unlock RepurposeSimilar repos coming soon.