Arno0x / DNSExfiltrator
Data exfiltration over DNS request covert channel
☆858Updated 10 months ago
Alternatives and similar repositories for DNSExfiltrator:
Users that are interested in DNSExfiltrator are comparing it to the libraries listed below
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,261Updated 3 years ago
- HTA encryption tool for RedTeams☆1,382Updated 2 years ago
- A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.☆1,884Updated last week
- 🕳 godoh - A DNS-over-HTTPS C2☆762Updated last year
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,125Updated 4 years ago
- Bash post exploitation toolkit☆727Updated last year
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,416Updated 2 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,578Updated 2 years ago
- A Python Package for Data Exfiltration☆773Updated 10 months ago
- Easy files and payloads delivery over DNS☆420Updated 11 months ago
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR☆2,233Updated last year
- Smart Install Exploitation Tool☆574Updated 3 years ago
- Open source pre-operation C2 server based on python and powershell☆745Updated 3 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆825Updated 7 years ago
- Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient☆1,479Updated 2 years ago
- DeimosC2 is a Golang command and control framework for post-exploitation.☆1,111Updated last year
- A tool to abuse Exchange services☆2,209Updated 9 months ago
- A tool which creates a spoofed certificate of any online website and signs an Executable for AV Evasion. Works for both Windows and Linux☆1,351Updated 4 years ago
- pwning IPv4 via IPv6☆1,764Updated last year
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,105Updated 7 years ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆543Updated 3 years ago
- swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searc…☆519Updated 3 years ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆597Updated 9 months ago
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆619Updated 2 years ago
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆541Updated last year
- Uses Empire's (https://github.com/BC-SECURITY/Empire) RESTful API to automate gaining Domain and/or Enterprise Admin rights in Active Dir…☆1,601Updated last year
- Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS☆1,488Updated 6 years ago
- Red Team Scripts by d0nkeys (ex SnadoTeam)☆692Updated 4 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,263Updated last month
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,081Updated 3 years ago