exfiltration
There are 122 repositories under exfiltration topic.
GTFOBins/GTFOBins.github.io
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
fulldecent/system-bus-radio
Transmits AM radio on computers without radio transmitting hardware.
TryCatchHCF/Cloakify
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
TryCatchHCF/PacketWhisper
PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems associated with typical DNS exfiltration methods. Transfer data between systems without the communicating devices directly connecting to each other or to a common endpoint. No need to control a DNS Name Server.
Spacial/awesome-csirt
Awesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.
SitinCloud/Owlyshield
Owlyshield is an EDR framework designed to safeguard vulnerable applications from potential exploitation (C&C, exfiltration and impact).
Skiller9090/Lucifer
A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Security Life
AleksaMCode/WiFi-password-stealer
Simple Windows and Linux keystroke injection tool that exfiltrates stored WiFi data (SSID and password).
mazen160/xless
The Serverless Blind XSS App
tokyoneon/CredPhish
CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.
Zarcolio/flipperzero
This repo contains my own Ducky/BadUSB scripts, related PowerShell scripts and other Flipper Zero related stuff.
Flangvik/Bobber
Bounces when a fish bites - Evilginx database monitoring with exfiltration automation
LyndLabs/DNS-DriveBy
Drive-by data exfiltration using open WiFi networks & DNS requests
t0thkr1s/gtfo
Search for Unix binaries that can be exploited to bypass system security restrictions.
anfractuosity/ultrasonicnetworking
Ultrasonic networking - Transmitting TCP/IP via Ultrasound
leonjza/qrxfer
Transfer files from Air gapped machines using QR codes
christophetd/IPv6teal
:wave: Stealthy data exfiltration via IPv6 covert channel
1N3/PowerExfil
A collection of data exfiltration scripts for Red Team assessments.
DamonMohammadbagher/NativePayload_Image
Transferring Backdoor Payloads with BMP Image Pixels
leonjza/dnsfilexfer
File transfer via DNS
AmgdGocha/DriveFS-Sleuth
DriveFS Sleuth is a Python tool that automates investigating Google Drive File Stream disk artifacts, the tool has been developed based on research that has been performed by mounting different scenarios and noting down the changes in the Google Drive File Stream disk artifacts.
tasooshi/exfilkit
Data exfiltration utility for testing detection capabilities
DamonMohammadbagher/NativePayload_BSSID
Transferring Backdoor Payload by BSSID and Wireless traffic
jaceddd/text_watermark
Allows invisible watermarking of text and invisible encrypted messages. Uses 17 different invisible characters as HEX + delimiter. Includes encoder, decoder, spammer and other tools.
anfractuosity/musicplayer
Play audio files (.wav) via the system bus of your computer and pickup with an AM radio
ekiojp/circo
Cisco Implant Raspberry Controlled Operations
OlivierLaflamme/DNSWho
transmit cs beacon (shellcode) over self-made dns to avoid anti-kill and AV
ekiojp/dfex
DNS File EXfiltration
drivebadger/drivebadger
Open source platform for covert data exfiltration operations, supporting all device types: computers, servers, mobile phones, tablets, pen drives and photo cameras.
reveng007/DareDevil
Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10
rverton/gxss
Blind XSS service alerting over slack or email
sourcefrenchy/certexfil
Exfiltration based on custom X509 certificates
TheBugFather/Advanced-Keylogger
Gathers network information, then simultaniously logs keys, takes screenshots, takes webcam pictures, and records mic.
r1vs3c/searchbins
Offline command line tool that searches for GTFOBins binaries that can be used to bypass local security restrictions in misconfigured systems.
anfractuosity/timeshifter
Transmissions over time based covert channels across a network. Modifies the time intervals between packets to transmit data.
cpl/exodus
Data exfiltration using DNS