exfiltration
Here are 46 public repositories matching this topic...
An Information Security Reference That Doesn't Suck
-
Updated
Jul 2, 2020
Curated list of Unix binaries that can be exploited to bypass system security restrictions
-
Updated
Jun 17, 2020 - HTML
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
-
Updated
May 27, 2020 - Python
PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems associated with typical DNS exfiltration methods. Transfer data between systems without the communicating devices directly connecting to each other or to a common endpoint. No need to control a DNS Name Server.
-
Updated
May 27, 2020 - Python
The Serverless Blind XSS App
-
Updated
Oct 29, 2019 - JavaScript
Ultrasonic networking - Transmitting TCP/IP via Ultrasound
-
Updated
May 30, 2017 - Python
CSIRT is an awesome curated list of links and resources in security and csirt daily activities.
-
Updated
Jun 8, 2020 - C
Transfer files from Air gapped machines using QR codes
-
Updated
Oct 10, 2016 - Python
-
Updated
Jul 26, 2019 - Python
A collection of data exfiltration scripts for Red Team assessments.
-
Updated
Feb 21, 2020 - PowerShell
Search for Unix binaries that can be exploited to bypass system security restrictions.
-
Updated
Jun 17, 2020 - Python
Play audio files (.wav) via the system bus of your computer and pickup with an AM radio
-
Updated
May 30, 2017 - C
Data exfiltration utility for testing detection capabilities
-
Updated
Mar 8, 2020 - Python
Cisco Implant Raspberry Controlled Operations
-
Updated
Jan 27, 2020 - Python
Transmissions over time based covert channels across a network
-
Updated
Jan 24, 2018 - C
Blind XSS service alerting over slack or email
-
Updated
Aug 6, 2019 - Go
Exfiltration based on custom X509 certificates
-
Updated
Jul 1, 2019 - Go
CDitter – Electromechanical based data exfiltration
-
Updated
May 30, 2017 - Python
Data exfiltration using DNS
-
Updated
Dec 28, 2019 - Go
Leaking (a lot of) Data from Air-Gapped Computers via the (small) Hard Drive LED
-
Updated
Feb 22, 2017 - Python
Covert data exfiltration and detection using 802.11 beacon stuffing
-
Updated
May 27, 2019 - Python
A simple way to exfiltrate data using spotify API
-
Updated
Jun 2, 2019 - Python
Receive data in ICMP padding from unix ping's -p option
-
Updated
Oct 30, 2019 - Python
Improve this page
Add a description, image, and links to the exfiltration topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the exfiltration topic, visit your repo's landing page and select "manage topics."


We should have a common format for describing tunes (series of beeps) across the different implementations in this repository. Extensive searching was done, a simple widespread standard was not found.
Following is proposed: