Generates malicious LNK file payloads for data exfiltration
-
Updated
Aug 21, 2017 - Python
Generates malicious LNK file payloads for data exfiltration
Python code to extract chrome cookie, history and login data files
Data EXfiltration TestER
Receive data in ICMP padding from unix ping's -p option
[Draft]Awesome Cyber Security Resource Collection. Currently contains 8000+ open source repositories, and not very well classified. For each repository, extra info included: star count, commit count, last update time. This is the DRAFT version.
C# bins to exfil data post-exfiltration.
Data exfiltration abusing x509 certificates
A network scanner written in python with data exfiltration
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems associated with typical DNS exfiltration methods. Transfer data between systems without the communicating devices directly connecting to each other or to a common endpoint. No need to control a DNS Name Server.
Personal Red Team Operation Tool: Data Exfiltration REST API
Modular HTTP/S server: mix 'n' match Auth, Caching, Proxy, and more
Red Team tool for exfiltrating files from a target's Google Drive that you have access to, via Google's API.
Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.
Golang binary for data exfiltration with ICMP protocol (+ ICMP bindshell, http over ICMP tunneling, ...)
This project includes a study and a PoC regarding the possibility of the data exfiltration using the light using a smart plug
Data exfiltration utility for testing detection capabilities
CDitter - Electromechanical based data exfiltration, through the movement of a CD drive
Transmissions over time based covert channels across a network. Modifies the time intervals between packets to transmit data.
Add a description, image, and links to the data-exfiltration topic page so that developers can more easily learn about it.
To associate your repository with the data-exfiltration topic, visit your repo's landing page and select "manage topics."