Shell-Company / QRExfilLinks
This tool is a command line utility that allows you to convert any binary file into a QRcode movie. The data can then be reassembled visually allowing exfiltration of data in air gapped systems
☆269Updated 2 years ago
Alternatives and similar repositories for QRExfil
Users that are interested in QRExfil are comparing it to the libraries listed below
Sorting:
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆380Updated last month
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆190Updated 8 months ago
- Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in…☆233Updated last year
- ☆562Updated last year
- A round-trip obfuscated HTTP file transfer setup built to bypass IDS detections.☆265Updated last year
- A collection of red teaming and adversary emulation related tools, scripts, techniques, notes, etc☆317Updated last year
- Wordlist to crack .zip-file password☆206Updated 3 years ago
- NMapify is a Python tool that creates mind maps to visualize network layouts using Nmap. It also generates test cases for each identified…☆58Updated 5 months ago
- ScrapPY is a Python utility for scraping manuals, documents, and other sensitive PDFs to generate wordlists that can be utilized by offen…☆217Updated 6 months ago
- A new approach to Browser In The Browser (BITB) without the use of iframes, allowing the bypass of traditional framebusters implemented b…☆425Updated last year
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆181Updated last year
- Redeye is a tool intended to help you manage your data during a pentest operation☆470Updated last year
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆197Updated 2 weeks ago
- Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.☆274Updated last year
- A PoC ransomware sample to test out your ransomware response strategy.☆212Updated 6 months ago
- NTP Exfiltration Tool☆146Updated last year
- A python tool to automate KeePass discovery and secret extraction.☆502Updated 10 months ago
- ☆352Updated 2 years ago
- A repository of credential stealer formats☆229Updated 4 months ago
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆561Updated 5 months ago
- ☆303Updated last year
- Next Generation DorX. Built by Dorks, for Dorks. 🤓☆112Updated 2 years ago
- "Bob the Smuggler": A tool that leverages HTML Smuggling Attack and allows you to create HTML files with embedded 7z/zip archives. The to…☆562Updated last week
- Nuclei templates for honeypots detection.☆196Updated last year
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆432Updated last month
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆135Updated last year
- autoNTDS is an automation script designed to simplify the process of dumping and cracking NTDS hashes using secretsdump.py and hashcat☆108Updated 2 years ago
- This OSINT Notebook provides an overview of the tools, techniques, and resources that I use for a variety of situations when it comes to …☆358Updated last year
- A python3 remake of the classic "tree" command with the additional feature of searching for user provided keywords/regex in files, highli…☆402Updated 9 months ago
- Traps web spiders☆76Updated 5 years ago