PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems associated with typical DNS exfiltration methods. Transfer data between systems without the communicating devices directly connecting to each other or to a common endpoint. No need to control a DNS Name Server.
☆648Jun 3, 2021Updated 4 years ago
Alternatives and similar repositories for PacketWhisper
Users that are interested in PacketWhisper are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Used to check for TCP and UDP egress filtering on both windows and unix client systems☆146Feb 5, 2021Updated 5 years ago
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based S…☆1,658Nov 24, 2020Updated 5 years ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,034May 27, 2020Updated 5 years ago
- A Python Package for Data Exfiltration☆803Jul 2, 2025Updated 9 months ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,317Jan 22, 2025Updated last year
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Dec 19, 2018Updated 7 years ago
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆108Aug 6, 2018Updated 7 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆207Dec 4, 2017Updated 8 years ago
- ☆128May 22, 2023Updated 2 years ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,905Jan 24, 2024Updated 2 years ago
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,315Jan 31, 2022Updated 4 years ago
- Network Pivoting Toolkit☆458Aug 26, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.☆1,829Nov 19, 2024Updated last year
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆947May 8, 2019Updated 6 years ago
- 🔵 Ethereum and BNB (BSC) Mev bot - Arbitrage☆362Mar 4, 2026Updated last month
- Bash post exploitation toolkit☆747Apr 1, 2026Updated 2 weeks ago
- Building an Active Directory domain and hacking it☆667Dec 23, 2019Updated 6 years ago
- Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities☆1,666Nov 28, 2020Updated 5 years ago
- Six Degrees of Domain Admin☆10,537Mar 2, 2026Updated last month
- Privilege Escalation Project - Windows / Linux / Mac☆2,605Oct 4, 2024Updated last year
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆2,729Jul 6, 2025Updated 9 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient☆1,561Oct 17, 2022Updated 3 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆4,664Jul 18, 2024Updated last year
- Egress-Assess is a tool used to test egress data detection capabilities☆700Aug 9, 2023Updated 2 years ago
- HTA encryption tool for RedTeams☆1,425Nov 9, 2022Updated 3 years ago
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,452Nov 20, 2025Updated 4 months ago
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,153Oct 19, 2025Updated 5 months ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆508Sep 23, 2025Updated 6 months ago
- Automated Tactics Techniques & Procedures☆261May 26, 2023Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Windows Event Log Killer☆1,813Sep 21, 2023Updated 2 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆824Nov 3, 2017Updated 8 years ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,729Sep 23, 2025Updated 6 months ago
- Email recon made fast and easy, with a framework to build on☆955Jan 12, 2023Updated 3 years ago
- dirt simple jsp webshell☆32Sep 17, 2016Updated 9 years ago
- network reconnaissance toolkit☆436Dec 17, 2018Updated 7 years ago
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,851Apr 25, 2024Updated last year