#夺旗赛 (CTF) 和网络安全资源#精选的Unix二进制文件列表,可以用来绕过错误配置系统中的本地安全限制
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting C...
PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems associated with typical DNS exfiltration methods. Transfer data betw...
#Awesome#Awesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.
Simple Windows and Linux keystroke injection tool that exfiltrates stored WiFi data (SSID and password).
#计算机科学#Owlyshield is an EDR framework designed to safeguard vulnerable applications from potential exploitation (C&C, exfiltration and impact).
A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Security L...
This repo contains my own Ducky/BadUSB scripts, related PowerShell scripts and other Flipper Zero related stuff.
CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.
Bounces when a fish bites - Evilginx database monitoring with exfiltration automation
Drive-by data exfiltration using open WiFi networks & DNS requests
Search for Unix binaries that can be exploited to bypass system security restrictions.
Ultrasonic networking - Transmitting TCP/IP via Ultrasound
👋 Stealthy data exfiltration via IPv6 covert channel
A collection of data exfiltration scripts for Red Team assessments.
Transferring Backdoor Payloads with BMP Image Pixels
DriveFS Sleuth is a Python tool that automates investigating Google Drive File Stream disk artifacts, the tool has been developed based on research that has been performed by mounting different scenar...