Pentesting toolbox for exfiltration
-
Updated
Jul 24, 2023 - Rust
Pentesting toolbox for exfiltration
Quick and dirty method do data exfil binary files in the form of hex strings to GCP's cloud logging easily bypassing most DLP
Data Exfiltration techniques from the compromised system.
Experimental helper scripts for testing malcode that exfiltrates stackshots of a Tmote Sky module's program memory stack in search for cryptographic keys (including the application of basic Maximal Sequential Pattern data mining on the exfiltrated stackshots to reduce the key search space)
A tool for receiving hidden data from the here_is_johnny_c2 program by monitoring port knocks in the UFW log and exfiltrating data back using a covert channel.
Personal Red Team Operation Tool: Data Exfiltration REST API
script that exfiltrate gcloud terminal app informations
Shaun's Python Repository
A command-and-control tool for remotely managing a Linux system running here_is_johnny_v using port-knocking and packet sniffing.
Windows malware techniques
A Pythonic Swiss-Army knife for conducting covert communications over insecure networks, generating encrypted reverse-shells, file transfers, and secure data storage.
This project includes a study and a PoC regarding the possibility of the data exfiltration using the light using a smart plug
A group of simple scripts in python and shell to zip up interesting credentials or other data and post them to a lightweight dns and http listeners. Shows POC and can be used to test SIEM triggers
Modular HTTP/S server: mix 'n' match Auth, Caching, Proxy, and more
Data Exfiltration via WebSerial
A network scanner written in python with data exfiltration
A Python-based client-server framework for educational network management. Control client devices remotely, stream webcams, execute shell commands, and more. Developed for learning about networking and cybersecurity.
🧲 Hide data exfiltration in harmless looking executable
exfiltrate information using DNS protocol 🤫
Add a description, image, and links to the data-exfiltration topic page so that developers can more easily learn about it.
To associate your repository with the data-exfiltration topic, visit your repo's landing page and select "manage topics."