Curated list of awesome, open source data exfiltration tools
☆62Oct 30, 2021Updated 4 years ago
Alternatives and similar repositories for awesome-data-exfiltration
Users that are interested in awesome-data-exfiltration are comparing it to the libraries listed below
Sorting:
- Data exfiltration and covert communication tool☆39Jan 10, 2023Updated 3 years ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆17Jun 22, 2024Updated last year
- ☆10Oct 25, 2020Updated 5 years ago
- Awesome hacking is an awesome collection of hacking tools.☆14Apr 24, 2019Updated 6 years ago
- Noob Penetration tester☆11Jul 17, 2025Updated 7 months ago
- Collection of web app methodology from initial recon into exploit known vulnerability. Used when conducting Bug Bounty, Penetration Testi…☆13Oct 23, 2021Updated 4 years ago
- reverse engineered and improved BSQLi script from Coffinxp☆15Aug 30, 2024Updated last year
- SQLI labs to test error based, Blind boolean based, Time based.☆17Feb 1, 2019Updated 7 years ago
- This repository offers a detailed taxonomy of existing AI-driven security solutions tailored for DevSecOps, highlighting the current rese…☆19Jul 2, 2025Updated 8 months ago
- curated list of open-source anti-censorship tools☆20Mar 31, 2022Updated 3 years ago
- An example of a mis-configured Rails application release under MIT license.☆21Jan 19, 2023Updated 3 years ago
- Força bruta em formulários web.☆19Feb 8, 2015Updated 11 years ago
- ☆21Mar 24, 2017Updated 8 years ago
- ☆26Jun 24, 2025Updated 8 months ago
- A simple bastion host setup designed for cloud-hosted lab environments.☆30Dec 4, 2020Updated 5 years ago
- A collection of awesome software, libraries, documents, books, resources and cool stuff about industrial control systems in cybersecurity…☆34Feb 9, 2025Updated last year
- ModBus RTU for Flipper Zero☆26Jan 2, 2026Updated 2 months ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆65May 31, 2020Updated 5 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Nov 11, 2022Updated 3 years ago
- PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems assoc…☆649Jun 3, 2021Updated 4 years ago
- ☆38Mar 4, 2020Updated 6 years ago
- ☆10Oct 9, 2024Updated last year
- Card Payments Simulation Tool For Indie Devs : Core Card Switch Engine, Fraud Engine, ATM/POS GUI Simulator , Admin Dash (Real-time MSG …☆19Jun 15, 2025Updated 8 months ago
- Weaponising C# - Fundamentals Training Content☆70May 11, 2021Updated 4 years ago
- ☆36Jul 11, 2018Updated 7 years ago
- Integrate Claude Code and Gemini CLI into your Obsidian workflow☆22Aug 21, 2025Updated 6 months ago
- Python Exploitation Framework☆30Updated this week
- ☆29Jan 19, 2026Updated last month
- A collection of scripts to convert the User Agent Database Dumps into various formats☆13Jun 19, 2020Updated 5 years ago
- Documentation for Neotoma, an open-source system for managing and reusing personal data online☆26Nov 18, 2017Updated 8 years ago
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- ☆11Nov 11, 2023Updated 2 years ago
- This simple SMB vulnerability MS17-010 scanner is developed to help security professionals to quickly check if a computer is vulnerable t…☆10Jul 24, 2017Updated 8 years ago
- ☆13Jun 26, 2025Updated 8 months ago
- What's is Hyperaudio? How do I get started?☆12Jan 26, 2023Updated 3 years ago
- PHP Application To Spoof And Send E-mail.☆10Jan 4, 2016Updated 10 years ago
- ☆17Feb 20, 2020Updated 6 years ago
- Convert Confluence MIME exports (.doc) to clean Markdown☆36Jan 13, 2026Updated last month
- A Docker-based development stack for Bedrock WordPress multisite, optimized for local development, source control, and CI/CD integration.☆14Jun 26, 2025Updated 8 months ago