exfiltration

There are 122 repositories under exfiltration topic.

  • GTFOBins/GTFOBins.github.io

    GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems

    Language:HTML10.2k139461.3k
  • fulldecent/system-bus-radio

    Transmits AM radio on computers without radio transmitting hardware.

    Language:C6.1k16817386
  • TryCatchHCF/Cloakify

    CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection

    Language:Python1.5k612230
  • TryCatchHCF/PacketWhisper

    PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems associated with typical DNS exfiltration methods. Transfer data between systems without the communicating devices directly connecting to each other or to a common endpoint. No need to control a DNS Name Server.

    Language:Python611193118
  • Spacial/awesome-csirt

    Awesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.

    Language:C39935180
  • SitinCloud/Owlyshield

    Owlyshield is an EDR framework designed to safeguard vulnerable applications from potential exploitation (C&C, exfiltration and impact).

    Language:Rust378153024
  • Lucifer

    Skiller9090/Lucifer

    A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Security Life

    Language:Python345212476
  • AleksaMCode/WiFi-password-stealer

    Simple Windows and Linux keystroke injection tool that exfiltrates stored WiFi data (SSID and password).

    Language:PowerShell3336328
  • mazen160/xless

    The Serverless Blind XSS App

    Language:JavaScript324812127
  • tokyoneon/CredPhish

    CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.

    Language:PowerShell2785244
  • Zarcolio/flipperzero

    This repo contains my own Ducky/BadUSB scripts, related PowerShell scripts and other Flipper Zero related stuff.

    Language:PowerShell2246111
  • Flangvik/Bobber

    Bounces when a fish bites - Evilginx database monitoring with exfiltration automation

    Language:Python135129
  • LyndLabs/DNS-DriveBy

    Drive-by data exfiltration using open WiFi networks & DNS requests

    Language:C++1328519
  • t0thkr1s/gtfo

    Search for Unix binaries that can be exploited to bypass system security restrictions.

    Language:Python1246125
  • anfractuosity/ultrasonicnetworking

    Ultrasonic networking - Transmitting TCP/IP via Ultrasound

    Language:Python1101609
  • leonjza/qrxfer

    Transfer files from Air gapped machines using QR codes

    Language:Python988322
  • christophetd/IPv6teal

    :wave: Stealthy data exfiltration via IPv6 covert channel

    Language:Python947119
  • 1N3/PowerExfil

    A collection of data exfiltration scripts for Red Team assessments.

    Language:PowerShell924034
  • DamonMohammadbagher/NativePayload_Image

    Transferring Backdoor Payloads with BMP Image Pixels

    Language:Shell799337
  • leonjza/dnsfilexfer

    File transfer via DNS

    Language:Python676315
  • AmgdGocha/DriveFS-Sleuth

    DriveFS Sleuth is a Python tool that automates investigating Google Drive File Stream disk artifacts, the tool has been developed based on research that has been performed by mounting different scenarios and noting down the changes in the Google Drive File Stream disk artifacts.

    Language:Python592
  • tasooshi/exfilkit

    Data exfiltration utility for testing detection capabilities

    Language:Python576018
  • DamonMohammadbagher/NativePayload_BSSID

    Transferring Backdoor Payload by BSSID and Wireless traffic

    Language:Shell566142
  • jaceddd/text_watermark

    Allows invisible watermarking of text and invisible encrypted messages. Uses 17 different invisible characters as HEX + delimiter. Includes encoder, decoder, spammer and other tools‬⁨⁠⁢⁠⁩⁠​⁠⁩⁠​‎⁠‎­⁠‎⁠⁩‍⁠⁠​⁩⁠‎⁠​⁨⁠​⁠⁠​‬⁠​‬⁠⁩⁠‬⁠‎⁠‍⁠​‬⁠‎⁠⁨⁠‎‍⁠.

    Language:JavaScript55105
  • anfractuosity/musicplayer

    Play audio files (.wav) via the system bus of your computer and pickup with an AM radio

    Language:C52612
  • ekiojp/circo

    Cisco Implant Raspberry Controlled Operations

    Language:Python507011
  • OlivierLaflamme/DNSWho

    transmit cs beacon (shellcode) over self-made dns to avoid anti-kill and AV

    Language:C#50217
  • ekiojp/dfex

    DNS File EXfiltration

    Language:Python45214
  • drivebadger/drivebadger

    Open source platform for covert data exfiltration operations, supporting all device types: computers, servers, mobile phones, tablets, pen drives and photo cameras.

    Language:Shell44409
  • reveng007/DareDevil

    Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10

    Language:C#38319
  • rverton/gxss

    Blind XSS service alerting over slack or email

    Language:Go33307
  • sourcefrenchy/certexfil

    Exfiltration based on custom X509 certificates

    Language:Go25214
  • TheBugFather/Advanced-Keylogger

    Gathers network information, then simultaniously logs keys, takes screenshots, takes webcam pictures, and records mic.

    Language:Python25428
  • r1vs3c/searchbins

    Offline command line tool that searches for GTFOBins binaries that can be used to bypass local security restrictions in misconfigured systems.

    Language:Shell24205
  • anfractuosity/timeshifter

    Transmissions over time based covert channels across a network. Modifies the time intervals between packets to transmit data.

    Language:C22408
  • exodus

    cpl/exodus

    Data exfiltration using DNS

    Language:Go21213