PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems associated with typical DNS exfiltration methods. Transfer data between systems without the communicating devices directly connecting to each other or to a common endpoint. No need to control a DNS Name Server.
☆649Jun 3, 2021Updated 4 years ago
Alternatives and similar repositories for PacketWhisper
Users that are interested in PacketWhisper are comparing it to the libraries listed below
Sorting:
- Used to check for TCP and UDP egress filtering on both windows and unix client systems☆146Feb 5, 2021Updated 5 years ago
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based S…☆1,652Nov 24, 2020Updated 5 years ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,035May 27, 2020Updated 5 years ago
- A Python Package for Data Exfiltration☆804Jul 2, 2025Updated 8 months ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,314Jan 22, 2025Updated last year
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Dec 19, 2018Updated 7 years ago
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆108Aug 6, 2018Updated 7 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆207Dec 4, 2017Updated 8 years ago
- ☆128May 22, 2023Updated 2 years ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,902Jan 24, 2024Updated 2 years ago
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,310Jan 31, 2022Updated 4 years ago
- Network Pivoting Toolkit☆457Aug 26, 2023Updated 2 years ago
- Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.☆1,821Nov 19, 2024Updated last year
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆948May 8, 2019Updated 6 years ago
- 🔵 Ethereum and BNB (BSC) Mev bot - Arbitrage☆364Mar 4, 2026Updated 2 weeks ago
- Bash post exploitation toolkit☆746Mar 8, 2026Updated 2 weeks ago
- Building an Active Directory domain and hacking it☆665Dec 23, 2019Updated 6 years ago
- Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities☆1,662Nov 28, 2020Updated 5 years ago
- Six Degrees of Domain Admin☆10,558Mar 2, 2026Updated 2 weeks ago
- Privilege Escalation Project - Windows / Linux / Mac☆2,600Oct 4, 2024Updated last year
- Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient☆1,557Oct 17, 2022Updated 3 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆4,641Jul 18, 2024Updated last year
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆2,699Jul 6, 2025Updated 8 months ago
- Egress-Assess is a tool used to test egress data detection capabilities☆699Aug 9, 2023Updated 2 years ago
- HTA encryption tool for RedTeams☆1,421Nov 9, 2022Updated 3 years ago
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,452Nov 20, 2025Updated 4 months ago
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,137Oct 19, 2025Updated 5 months ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆507Sep 23, 2025Updated 5 months ago
- Automated Tactics Techniques & Procedures☆259May 26, 2023Updated 2 years ago
- Windows Event Log Killer☆1,813Sep 21, 2023Updated 2 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆827Nov 3, 2017Updated 8 years ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,722Sep 23, 2025Updated 5 months ago
- Email recon made fast and easy, with a framework to build on☆953Jan 12, 2023Updated 3 years ago
- dirt simple jsp webshell☆32Sep 17, 2016Updated 9 years ago
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,802Apr 25, 2024Updated last year
- network reconnaissance toolkit☆436Dec 17, 2018Updated 7 years ago