Transmits AM radio on computers without radio transmitting hardware.
-
Updated
Jul 15, 2020 - C
Transmits AM radio on computers without radio transmitting hardware.
An Information Security Reference That Doesn't Suck
Curated list of Unix binaries that can be exploited to bypass system security restrictions
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems associated with typical DNS exfiltration methods. Transfer data between systems without the communicating devices directly connecting to each other or to a common endpoint. No need to control a DNS Name Server.
The Serverless Blind XSS App
Ultrasonic networking - Transmitting TCP/IP via Ultrasound
CSIRT is an awesome curated list of links and resources in security and csirt daily activities.
Transfer files from Air gapped machines using QR codes
Search for Unix binaries that can be exploited to bypass system security restrictions.
A collection of data exfiltration scripts for Red Team assessments.
Play audio files (.wav) via the system bus of your computer and pickup with an AM radio
Data exfiltration utility for testing detection capabilities
Cisco Implant Raspberry Controlled Operations
Transmissions over time based covert channels across a network
Blind XSS service alerting over slack or email
Exfiltration based on custom X509 certificates
Data exfiltration using DNS
CDitter – Electromechanical based data exfiltration
Leaking (a lot of) Data from Air-Gapped Computers via the (small) Hard Drive LED
Covert data exfiltration and detection using 802.11 beacon stuffing
A simple way to exfiltrate data using spotify API
Receive data in ICMP padding from unix ping's -p option
Add a description, image, and links to the exfiltration topic page so that developers can more easily learn about it.
To associate your repository with the exfiltration topic, visit your repo's landing page and select "manage topics."