Shell-Company / QRExfil
This tool is a command line utility that allows you to convert any binary file into a QRcode movie. The data can then be reassembled visually allowing exfiltration of data in air gapped systems
☆262Updated last year
Alternatives and similar repositories for QRExfil:
Users that are interested in QRExfil are comparing it to the libraries listed below
- A round-trip obfuscated HTTP file transfer setup built to bypass IDS detections.☆254Updated 9 months ago
- ☆529Updated 10 months ago
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆179Updated 3 weeks ago
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆361Updated 2 weeks ago
- NTP Exfiltration Tool☆137Updated last year
- A collection of red teaming and adversary emulation related tools, scripts, techniques, notes, etc☆287Updated 6 months ago
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆391Updated 2 weeks ago
- ☆338Updated last year
- ☆285Updated 7 months ago
- Nuclei templates for honeypots detection.☆196Updated last year
- Redeye is a tool intended to help you manage your data during a pentest operation☆464Updated 5 months ago
- ☆173Updated 2 months ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆175Updated 6 months ago
- A repository of credential stealer formats☆190Updated 3 weeks ago
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆350Updated 10 months ago
- A RedTeam Toolkit☆394Updated 3 months ago
- Shodan Dorks 2023☆234Updated last month
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆131Updated 6 months ago
- ☆139Updated 2 months ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆191Updated last month
- ☆248Updated 4 months ago
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆346Updated this week
- Azure mindmap for penetration tests☆175Updated last year
- Python3 terminal application that contains 405 Neo4j cyphers for BloodHound data sets and 388 GUI cyphers☆375Updated 4 months ago
- LDAP enumeration tool implemented in Python3☆224Updated 4 months ago
- Wordlist to crack .zip-file password☆200Updated 2 years ago
- Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.☆273Updated 7 months ago
- ☆309Updated 10 months ago
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆139Updated 3 months ago
- ☆186Updated 2 years ago