Hide secrets with invisible characters in plain text securely using passwords 🧙🏻♂️
-
Updated
Jun 1, 2022 - JavaScript
{{ message }}
Hide secrets with invisible characters in plain text securely using passwords 🧙🏻♂️
Upload arbitrary data via Apple's Find My network.
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
A Python Package for Data Exfiltration
PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems associated with typical DNS exfiltration methods. Transfer data between systems without the communicating devices directly connecting to each other or to a common endpoint. No need to control a DNS Name Server.
[Draft]Awesome Cyber Security Resource Collection. Currently contains 8000+ open source repositories, and not very well classified. For each repository, extra info included: star count, commit count, last update time. This is the DRAFT version.
Generates malicious LNK file payloads for data exfiltration
Golang binary for data exfiltration with ICMP protocol (+ ICMP bindshell, http over ICMP tunneling, ...)
A Red Team tool for exfiltrating sensitive data from Jira tickets.
A Red Team tool for exfiltrating sensitive data from Confluence pages.
Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.
Python code to extract chrome cookie, history and login data files
Data exfiltration utility for testing detection capabilities
Red Team tool for exfiltrating files from a target's Google Drive that you have access to, via Google's API.
Transmissions over time based covert channels across a network. Modifies the time intervals between packets to transmit data.
Data EXfiltration TestER
Data Exfiltration via HTTP Traffic (C# and Shell Script)
A script for SOC operators' first analysis. Disable Defender and dump credentials.
Receive data in ICMP padding from unix ping's -p option
Data exfiltration and covert communication tool
CDitter - Electromechanical based data exfiltration, through the movement of a CD drive
Modular HTTP/S server: mix 'n' match Auth, Caching, Proxy, and more
C# bins to exfil data post-exfiltration.
Data exfiltration abusing x509 certificates
exfiltrate information using DNS protocol
This project includes a study and a PoC regarding the possibility of the data exfiltration using the light using a smart plug
A network scanner written in python with data exfiltration
Personal Red Team Operation Tool: Data Exfiltration REST API
Add a description, image, and links to the data-exfiltration topic page so that developers can more easily learn about it.
To associate your repository with the data-exfiltration topic, visit your repo's landing page and select "manage topics."