GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
-
Updated
Jun 16, 2022 - HTML
{{ message }}
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
Transmits AM radio on computers without radio transmitting hardware.
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems associated with typical DNS exfiltration methods. Transfer data between systems without the communicating devices directly connecting to each other or to a common endpoint. No need to control a DNS Name Server.
A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Security Life
Awesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.
The Serverless Blind XSS App
CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.
Ultrasonic networking - Transmitting TCP/IP via Ultrasound
Search for Unix binaries that can be exploited to bypass system security restrictions.
Transfer files from Air gapped machines using QR codes
A collection of data exfiltration scripts for Red Team assessments.
Transferring Backdoor Payloads with BMP Image Pixels
Cisco Implant Raspberry Controlled Operations
Transferring Backdoor Payload by BSSID and Wireless traffic
Play audio files (.wav) via the system bus of your computer and pickup with an AM radio
transmit cs beacon (shellcode) over self-made dns to avoid anti-kill and AV
Data exfiltration utility for testing detection capabilities
Blind XSS service alerting over slack or email
Transmissions over time based covert channels across a network. Modifies the time intervals between packets to transmit data.
Open source platform for covert data exfiltration operations, supporting all device types: computers, servers, mobile phones, tablets, pen drives and photo cameras.
Data exfiltration using DNS
Exfiltration based on custom X509 certificates
Data Exfiltration via HTTP Traffic (C# and Shell Script)
Simple Script "NativePayload_ARP2.sh" for Sending DATA via ARP Bcast Traffic to all systems in (LAN) by "Vid" tag
A set of libraries and accompanying tools for post-exploitation, written in Golang.
Add a description, image, and links to the exfiltration topic page so that developers can more easily learn about it.
To associate your repository with the exfiltration topic, visit your repo's landing page and select "manage topics."