Hide secrets with invisible characters in plain text securely using passwords 🧙🏻♂️⭐
-
Updated
Oct 1, 2024 - JavaScript
Hide secrets with invisible characters in plain text securely using passwords 🧙🏻♂️⭐
Upload arbitrary data via Apple's Find My network.
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
A Python Package for Data Exfiltration
PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems associated with typical DNS exfiltration methods. Transfer data between systems without the communicating devices directly connecting to each other or to a common endpoint. No need to control a DNS Name Server.
[Draft]Awesome Cyber Security Resource Collection. Currently contains 8000+ open source repositories, and not very well classified. For each repository, extra info included: star count, commit count, last update time. This is the DRAFT version.
Generates malicious LNK file payloads for data exfiltration
SecretPixel is a cutting-edge steganography tool designed to securely conceal sensitive information within images. It stands out in the realm of digital steganography by combining advanced encryption, compression, and a seeded Least Significant Bit (LSB) technique to provide a robust solution for embedding data undetectably.
A prototype malware C2 channel using x509 certificates over mTLS
Drive-by data exfiltration using open WiFi networks & DNS requests
Golang binary for data exfiltration with ICMP protocol (+ ICMP bindshell, http over ICMP tunneling, ...)
A Red Team tool for exfiltrating sensitive data from Confluence pages.
VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data exfiltration techniques used by advanced threat actors, allowing organizations to evaluate and improve their security posture.
A Red Team tool for exfiltrating sensitive data from Jira tickets.
Advanced Telegram x Discord C2, great for data Exfitration and Network evasion 🔷
Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.
Python code to extract chrome cookie, history and login data files
Data exfiltration utility for testing detection capabilities
Red Team tool for exfiltrating files from a target's Google Drive that you have access to, via Google's API.
Data exfiltration and covert communication tool
Add a description, image, and links to the data-exfiltration topic page so that developers can more easily learn about it.
To associate your repository with the data-exfiltration topic, visit your repo's landing page and select "manage topics."