Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for exfiltration
exfiltration
x
108 search results found
System Bus Radio
⭐
6,105
Transmits AM radio on computers without radio transmitting hardware.
Cloakify
⭐
1,483
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Dnsteal
⭐
1,265
DNS Exfiltration tool for stealthily sending files over DNS requests.
Red_team
⭐
1,219
Some scripts useful for red team activities
Attck Pentester Book
⭐
864
ATTCK-PenTester-Book
Packetwhisper
⭐
611
PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems associated with typical DNS exfiltration methods. Transfer data between systems without the communicating devices directly connecting to each other or to a common endpoint. No need to control a DNS Name Server.
Sg1
⭐
497
A wanna be swiss army knife for data encryption, exfiltration and covert communication.
Hassh
⭐
490
HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints can be easily stored, searched and shared in the form of a small MD5 fingerprint.
Sharpmapexec
⭐
471
Xxexploiter
⭐
406
Tool to help exploit XXE vulnerabilities
Awesome Csirt
⭐
368
Awesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.
Owlyshield
⭐
301
Owlyshield is an EDR framework designed to safeguard vulnerable applications from potential exploitation (C&C, exfiltration and impact).
Credphish
⭐
262
CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.
Xless
⭐
224
The Serverless Blind XSS App
Wifi Password Stealer
⭐
223
Simple Windows and Linux keystroke injection tool that exfiltrates stored WiFi data (SSID and password).
Esc
⭐
221
Evil SQL Client (ESC) is an interactive .NET SQL console client with enhanced SQL Server discovery, access, and data exfiltration features. While ESC can be a handy SQL Client for daily tasks, it was originally designed for targeting SQL Servers during penetration tests and red team engagements. The intent of the project is to provide an .exe, but also sample files for execution through mediums like msbuild and PowerShell.
Supremeduck
⭐
207
USB keystroke injector controlled by smartphone.
Procrustes
⭐
197
A bash script that automates the exfiltration of data over dns in case we have a blind command execution on a server where all outbound connections except DNS are blocked.
Lnkup
⭐
192
Generates malicious LNK file payloads for data exfiltration
Lucifer
⭐
177
A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Security Life
Sic
⭐
149
A tool to perform Sequential Import Chaining
Flipperzero
⭐
143
This repo contains my own Ducky/BadUSB scripts, related PowerShell scripts and other Flipper Zero related stuff.
Beemka
⭐
136
Basic Electron Exploitation
Keycroc Payloads
⭐
131
The Official Key Croc Payload Repository
Sneaky Creeper
⭐
126
Get your APT on using social media as a tool for data exfiltration.
Dns Driveby
⭐
114
Drive-by data exfiltration using open WiFi networks & DNS requests
Snicat
⭐
97
SNIcat
Dllpasswordfilterimplant
⭐
97
DLL Password Filter Implant with Exfiltration Capabilities
Pentestkoala
⭐
93
Modified dropbear server which acts as a client and allows authless login
Dns Exfiltration
⭐
83
Exfiltrate files via DNS
Xxetimes
⭐
79
An interactive OOB XXE data exfiltration tool
Gtfo
⭐
76
Search for Unix binaries that can be exploited to bypass system security restrictions.
Qrxfer
⭐
73
Transfer files from Air gapped machines using QR codes
Arecibo
⭐
66
Endpoint for Out-of-Band Exfiltration (DNS & HTTP)
Ipv6dnsexfil
⭐
66
Data Exfiltration and Command Execution via AAAA Records
Ipv6teal
⭐
65
👋 Stealthy data exfiltration via IPv6 covert channel
Nativepayload_image
⭐
59
Transferring Backdoor Payloads with BMP Image Pixels
Wifi_ccc
⭐
56
Wi-Fi Covert Channel Chat demo application
Powerexfil
⭐
56
A collection of data exfiltration scripts for Red Team assessments.
Musicplayer
⭐
51
Play audio files (.wav) via the system bus of your computer and pickup with an AM radio
Nativepayload_bssid
⭐
48
Transferring Backdoor Payload by BSSID and Wireless traffic
Megadev
⭐
44
Bro IDS + ELK Stack to detect and block data exfiltration
Exfilkit
⭐
44
Data exfiltration utility for testing detection capabilities
Nativepayload_dns2
⭐
41
C# code for Transferring Backdoor Payloads by DNS Traffic (A - PTR Records) and Bypassing Anti-viruses
Dnsfilexfer
⭐
41
File transfer via DNS
Circo
⭐
39
Cisco Implant Raspberry Controlled Operations
Naishodenusumu
⭐
36
Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filters and other blue team tools by making exfiltration data look like legitimate traffic through covert channels
Exfil
⭐
35
Modular tool to test exfiltration techniques.
Break Free
⭐
34
Escaping Restricted Environments and Bypassing DLP
Bobber
⭐
33
Bounces when a fish bites - Evilginx database monitoring with exfiltration automation
Pulsar
⭐
32
Data exfiltration and covert communication tool
Drivefs Sleuth
⭐
32
DriveFS Sleuth is a Python tool that automates investigating Google Drive File Stream disk artifacts, the tool has been developed based on research that has been performed by mounting different scenarios and noting down the changes in the Google Drive File Stream disk artifacts.
Cachetalk
⭐
31
Proof-of-concept program that is able to read and write arbitrary bits using HTTP server-side caching
Pylogger
⭐
31
🐍 A Python Keylogger for Windows
Kisskissie
⭐
30
XXE attack tool
Dns_detection
⭐
29
Detecting DNS Spoofing, DNS Tunneling, DNS Exfiltration
Xxxpwn
⭐
25
Advanced XPath Injection Tool
Certexfil
⭐
25
Exfiltration based on custom X509 certificates
Pnacl_leaker
⭐
24
Simple PoC to leak contents from embedded origin
Dfex
⭐
23
DNS File EXfiltration
Whid Payloads
⭐
21
A collection of Payloads for the WHID Cactus
Drivebadger
⭐
21
Open source platform for covert data exfiltration operations, supporting all device types: computers, servers, mobile phones, tablets, pen drives and photo cameras.
Timeshifter
⭐
21
Transmissions over time based covert channels across a network. Modifies the time intervals between packets to transmit data.
Text_watermark
⭐
19
Allows invisible watermarking of text and invisible encrypted messages. Uses 17 different invisible characters as HEX + delimiter. Includes encoder, decoder, spammer and other tools
Exphil
⭐
19
Data exfiltration PoC scripts
Busasm
⭐
19
AM radio data exfiltration with CPU cache in assembly
Goredloot
⭐
18
A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.
Dnswho
⭐
16
transmit cs beacon (shellcode) over self-made dns to avoid anti-kill and AV
Cryptopayload
⭐
15
module for certexfil
Daredevil
⭐
15
Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10
Uyr
⭐
15
Under Your Radar (UYR): Exfiltration using Steganography
Advanced Keylogger
⭐
14
Gathers network information, then simultaniously logs keys, takes screenshots, takes webcam pictures, and records mic.
Dissembling Ferret
⭐
14
Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.
Dftp
⭐
14
Python DNS Exfiltration Tool - Domain Name Service File Transfer Protocol (DFTP) Client and Server. TODO: Integrate Lexer, Parser instead of split()
Sqlc
⭐
13
sqlc - Universal DBMS/SQL client with exfiltration features :)
Insiderthreat Streamreasoningusecase
⭐
12
This use case aims to leverage stream reasoning techniques and the concept of semantic importance to detect one attacking type of the insider threat -- data exfiltration
Gxss
⭐
12
Blind XSS service alerting over slack or email
Spotexfil
⭐
12
A simple way to exfiltrate data using spotify API
Packetknockout
⭐
11
Packet Knock-Out is an exploration in a method of data exfiltration via packet port numbers.
Leditgo
⭐
11
Leaking (a lot of) Data from Air-Gapped Computers via the (small) Hard Drive LED
Nativepayload_http
⭐
10
Data Exfiltration via HTTP Traffic (C# and Shell Script)
Postex Tools
⭐
10
A set of libraries and accompanying tools for post-exploitation, written in Golang.
Rf Xfil
⭐
10
Prototype Toolkit for Data Exfiltration over Radio Frequencies -- Developed @ HackSmith v2.0
Dexter
⭐
10
Data EXfiltration TestER
Poltergeist
⭐
10
A tool to encode and decode content as whitespace
Dns_exfiltration
⭐
9
Simple DNS exfiltration using base64-encoded URL's
Gitar
⭐
9
📡 Ease file sharing during pentest/CTF 🎸
Crypto Masterkey Keystore
⭐
9
Custom KeyStore implementations for Master Keys
Nativepayload_arp2
⭐
8
Simple Script "NativePayload_ARP2.sh" for Sending DATA via ARP Bcast Traffic to all systems in (LAN) by "Vid" tag
Sidekek
⭐
8
SideKEK library - inexpensive means to protect cryptographic master keys (key encryption keys, KEKs) in a way that is resistant to some of the most common remote file exfiltration attacks
Forfun
⭐
8
Just a repo where I can share some of the stuff I found by accident or just for fun
Gtcpi
⭐
7
Undlp
⭐
6
Discreetly exfiltrate information via the HTTPS protocol.
Brchd
⭐
6
Data exfiltration toolkit
Unreputabledomainslist
⭐
6
A collection of Unreputable Domains
Dns Exfilnspector
⭐
6
Automagically decode DNS Exfiltration queries to convert Blind RCE into proper RCE via Burp Collaborator
Qrtransfer
⭐
6
Transfer your file from an air-gapped device to another, using only qrcode, no wifi/usb/bluetooth needed.
Exodus
⭐
6
Data exfiltration using DNS
Assetcrypt
⭐
6
A small scale file encryption software for confidential files on the disk
Leaky_diode
⭐
6
Leaky diode is a data exfiltration test tool for data diodes.
1-100 of 108 search results
Next >
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.