Curated list of awesome, open source data exfiltration tools
☆61Oct 30, 2021Updated 4 years ago
Alternatives and similar repositories for awesome-data-exfiltration
Users that are interested in awesome-data-exfiltration are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Data exfiltration and covert communication tool☆39Jan 10, 2023Updated 3 years ago
- ☆18Feb 25, 2024Updated 2 years ago
- A simple way to exfiltrate data using spotify API☆19Apr 10, 2026Updated last week
- curated list of open-source anti-censorship tools☆20Mar 31, 2022Updated 4 years ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆17Jun 22, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- reverse engineered and improved BSQLi script from Coffinxp☆15Aug 30, 2024Updated last year
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆38Feb 16, 2020Updated 6 years ago
- Creating a resource to help build and manage an Insider Threat program.☆101Jan 30, 2025Updated last year
- ☆60Aug 11, 2023Updated 2 years ago
- This is a fork. Not sure where the original went! -pave Notes for all my Pentesting to help my bad memory :p☆26Dec 11, 2015Updated 10 years ago
- Noob Penetration tester☆11Jul 17, 2025Updated 9 months ago
- Old home of LimaCharlie, open source EDR☆32Sep 4, 2023Updated 2 years ago
- This repository offers a detailed taxonomy of existing AI-driven security solutions tailored for DevSecOps, highlighting the current rese…☆20Jul 2, 2025Updated 9 months ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Nov 11, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆43Oct 28, 2016Updated 9 years ago
- ModBus RTU for Flipper Zero☆26Jan 2, 2026Updated 3 months ago
- ☆10Oct 25, 2020Updated 5 years ago
- Download your Ring doorbell videos from The Cloud™☆13Dec 10, 2022Updated 3 years ago
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 7 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆65May 31, 2020Updated 5 years ago
- This batch script file wants to check your EDR systems detection and response capabilities in a more noisy way!☆12Jul 3, 2020Updated 5 years ago
- Powershell modules and commands that come in handy for pentests and red team assessments.☆22Oct 31, 2018Updated 7 years ago
- This repository stores the proof-of-concept of Windows malware categorized with MITRE ATT&CK.☆14Nov 8, 2024Updated last year
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A collection of awesome software, libraries, documents, books, resources and cool stuff about industrial control systems in cybersecurity…☆35Feb 9, 2025Updated last year
- Collection of the cheat sheets useful for pentesting☆10May 11, 2018Updated 7 years ago
- ☆16Nov 14, 2016Updated 9 years ago
- LiteSpeed Cache Privilege Escalation PoC☆21Aug 25, 2024Updated last year
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆50May 8, 2024Updated last year
- ☆38Mar 4, 2020Updated 6 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated last year
- Forwards bank SMS messages to an online server, help to automate transaction creation in FireFly-III.☆14May 14, 2024Updated last year
- Black Hat Python, 2nd Edition - Justin Seitz & Tim Arnold☆11Mar 18, 2021Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A Lighthaus theme for Fish Shell☆14Jan 10, 2023Updated 3 years ago
- python exploit for werkzeug debug shell command execution☆10Jun 26, 2017Updated 8 years ago
- Visualize Microsoft Defender XDR process trees and security events☆33Aug 24, 2025Updated 7 months ago
- CTF Writeups for the UW CTF Team☆15Dec 4, 2019Updated 6 years ago
- Searches for Insider Threat Hunting☆30May 2, 2019Updated 6 years ago
- Convert IP addresses to emojis☆14Jan 11, 2023Updated 3 years ago
- Script to Debloat Android Apps - No ROOT/Unlocked Bootloader Required!☆13Dec 25, 2021Updated 4 years ago