Shell-Company / QRExfilLinks
This tool is a command line utility that allows you to convert any binary file into a QRcode movie. The data can then be reassembled visually allowing exfiltration of data in air gapped systems
☆268Updated 2 years ago
Alternatives and similar repositories for QRExfil
Users that are interested in QRExfil are comparing it to the libraries listed below
Sorting:
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆375Updated 6 months ago
- ☆543Updated last year
- NTP Exfiltration Tool☆142Updated last year
- Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.☆273Updated last year
- Nuclei templates for honeypots detection.☆196Updated last year
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆189Updated 5 months ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆180Updated last year
- ScrapPY is a Python utility for scraping manuals, documents, and other sensitive PDFs to generate wordlists that can be utilized by offen…☆211Updated 3 months ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆198Updated 2 weeks ago
- Wordlist to crack .zip-file password☆204Updated 3 years ago
- A round-trip obfuscated HTTP file transfer setup built to bypass IDS detections.☆258Updated last year
- Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in…☆228Updated 9 months ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆133Updated last year
- NMapify is a Python tool that creates mind maps to visualize network layouts using Nmap. It also generates test cases for each identified…☆57Updated 2 months ago
- A collection of red teaming and adversary emulation related tools, scripts, techniques, notes, etc☆312Updated 11 months ago
- A tool to recover content from files encrypted with intermittent encryption☆235Updated 5 months ago
- Next Generation DorX. Built by Dorks, for Dorks. 🤓☆104Updated last year
- A SOCKS proxy written in Python that randomizes your source IP address. Round-robin your evil packets through SSH tunnels or give them bi…☆455Updated 4 months ago
- ☆190Updated 2 years ago
- Nmap script that scans for probable vulnerabilities based on services discovered in open ports.☆206Updated 4 months ago
- Strumenti di Acquisizione e Analisi di copie Forensi☆156Updated last year
- ☆347Updated 2 years ago
- A PoC ransomware sample to test out your ransomware response strategy.☆211Updated 3 months ago
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- Dredging up secrets from the depths of the file system☆128Updated 8 months ago
- "Bob the Smuggler": A tool that leverages HTML Smuggling Attack and allows you to create HTML files with embedded 7z/zip archives. The to…☆549Updated 4 months ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆132Updated last year
- Redeye is a tool intended to help you manage your data during a pentest operation☆468Updated 11 months ago
- A python tool to automate KeePass discovery and secret extraction.☆495Updated 7 months ago
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆364Updated 5 months ago