, . o | ,--. , . |\ |,---..,---.|---.,---.| |,---.|\ |. .,---.. .,-.-.. . | \ |,---||`---.| || || ||---'| \ || |`---.| || | || | ` `'`---^``---'` '`---'`--' `---'` `'`---'`---'`---'` ' '`---' Stealing Secretly [Copyright (C) 2014, Adam Crompton (@3nc0d3r)] ..............,:~~=+++?????+++++~:::,:~~~::,,............... ..............,:~~=+++????II????+~:~:,::~~::,,.............. ...............:~~=+++?????III???+~:~,:~~:::,,.............. ................,:~=+++??????II???+~:~::~~::,............... .......................,:=+???????+=~,:,::.................. .............................,:~++++=~,..................... ........,.............:,,.,:,...,+++=~....:,,............... ......................:==:+=,....:??+:..:==:................ .................................:??+:...................... .......,........,,,,,...........,+?I?~...................... ................,:~~:::::::,,:::=?I7I+:,,,,,,,,,............ ..........,......:=++++++==+++=+?II77?+=~==~~~:,............ ...........,......~+??IIIIIII??+?I777I+==++++=~:............ ..................:=??IIIIIII?++?I777I?===+??=~:,....,...... ...................:+??IIIIII?+=?I777I?~~=+++=~::........... .........,..........:=??IIIII?==~+???+~:~====~~:,........... .........,...........,=+???????+==~:~~~==+==:~:,............ ..........,...........,,~==+??????===+?+=+~:,,,............. ...........,...........,,::,:~~==~~+=:~~::,,................ ............,............,,,,,.,..~?~..,,,,,......S1L3NT.... ..................,........::,..,,=?=::,.,:................. ............................,:~:..+??:.,,,.................. ..............................,~~:=??+:,.................... .........,.......,...............,+II?,..................... ..............,.................,:=II?=..................... ,...,,......,.,..,,...........,,,,~III?..................... ,.::,,,.......,,.,,,..........,,,,~III?:.................... :.:::,........,,..,,..........,,:,~IIII=.................... ~.~~:,.,,.....,,...,........:~~,,,,+?II+,.........,......... =.~~:..::,....,,,..,,~=:..:=?I??+==+==?+~........,,......... =::~:.,,~,....,:,..,,==:==+IIIIIII?++??+=,.....,............ ==.:,.,,:,....:,,..,.:~+I7I+~++===+?I?I???+~...:............ +=,.,..,.:.,.,:,,.,,:~?I?=~+I7IIIII?+==++???:..,............ ===:..,:.~,..,,,,,.,:+?~+?I777777IIIII??==~=:.,,............ ===~,.,:,:.,.,.:..,::~~?I77I?+~=++?IIIIIII?=,..,............ ===~,:,.,,.....:..:~:~?II?=~=+??II??+=+?III?,............... ===~:~::,......,..,,,+?+~,+?IIII77IIII+~==++:.,............. ===~::::,.,,..,.....~:~~.:+IIIIIIII77III?+?~:..,............ ~~~~~::,,,~,..,..,..==+.:~+=~===~~=?IIIIIII?~..,............ :::::,,,::~:,,.......,.....,~=++==~:==?IIII?~..,............ :,,,,,,:::~,,...............:=++++=~:~+?III?=............... ,,..,,,::::,,................~+++++:::+?II??+,..,........... _____________________________________________________________ Dependencies: pyCrypto, Stepic, stegohide, scapy, pexpect Usage: ./Naisho.py *Note: Adding any value to argv[1] will not display ui face. Usage: ./Denusumu.py '<encrypted string>' Creating RSA Keys: (needs openssl to create the keys) ./keys.sh Enjoy!! Next version will have alot of new features.
3nc0d3r/NaishoDeNusumu
Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filters and other blue team tools by making exfiltration data look like legitimate traffic through covert channels
Python