Shell-Company / QRExfilLinks
This tool is a command line utility that allows you to convert any binary file into a QRcode movie. The data can then be reassembled visually allowing exfiltration of data in air gapped systems
☆269Updated 2 years ago
Alternatives and similar repositories for QRExfil
Users that are interested in QRExfil are comparing it to the libraries listed below
Sorting:
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆194Updated 10 months ago
- ☆567Updated last year
- Nuclei templates for honeypots detection.☆196Updated 2 years ago
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆386Updated 3 months ago
- NTP Exfiltration Tool☆147Updated 2 years ago
- ScrapPY is a Python utility for scraping manuals, documents, and other sensitive PDFs to generate wordlists that can be utilized by offen…☆220Updated 8 months ago
- A PoC ransomware sample to test out your ransomware response strategy.☆212Updated last month
- Wordlist to crack .zip-file password☆207Updated 3 years ago
- Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in…☆238Updated last year
- Strumenti di Acquisizione e Analisi di copie Forensi☆171Updated 4 months ago
- Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.☆276Updated last year
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆136Updated last year
- With EmailAnalyzer you can analyze your suspicious emails. You can extract headers, links, and hashes from the .eml file and you can gene…☆282Updated 2 years ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆106Updated 2 years ago
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- A round-trip obfuscated HTTP file transfer setup built to bypass IDS detections.☆268Updated last year
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆180Updated last year
- ☆352Updated 2 years ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆197Updated last month
- A collection of red teaming and adversary emulation related tools, scripts, techniques, notes, etc☆318Updated last year
- Next Generation DorX. Built by Dorks, for Dorks. 🤓☆110Updated 2 years ago
- A repository of credential stealer formats☆236Updated 6 months ago
- This OSINT Notebook provides an overview of the tools, techniques, and resources that I use for a variety of situations when it comes to …☆358Updated last year
- A tool to recover content from files encrypted with intermittent encryption☆239Updated 10 months ago
- autoNTDS is an automation script designed to simplify the process of dumping and cracking NTDS hashes using secretsdump.py and hashcat☆109Updated 2 years ago
- OSINT tool that finds domains, subdomains, directories, endpoints and files for a given seed URL.☆181Updated last year
- Nmap script that scans for probable vulnerabilities based on services discovered in open ports.☆218Updated 9 months ago
- ☆306Updated last year
- Your go-to resource for all things OSINT☆181Updated last year
- ☆317Updated last year