Curated list of awesome, open source data exfiltration tools
☆62Oct 30, 2021Updated 4 years ago
Alternatives and similar repositories for awesome-data-exfiltration
Users that are interested in awesome-data-exfiltration are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Data exfiltration and covert communication tool☆39Jan 10, 2023Updated 3 years ago
- A simple way to exfiltrate data using spotify API☆20Feb 11, 2026Updated last month
- Awesome hacking is an awesome collection of hacking tools.☆14Apr 24, 2019Updated 6 years ago
- curated list of open-source anti-censorship tools☆20Mar 31, 2022Updated 3 years ago
- reverse engineered and improved BSQLi script from Coffinxp☆15Aug 30, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A firefox profile for web security enthusiasts (Supposed to be configured with woobuntu )☆10Jul 6, 2016Updated 9 years ago
- Simulating Adversary Operations☆98Apr 13, 2018Updated 7 years ago
- A collection of awesome resources for Splunk Enterprise Security☆22Sep 11, 2020Updated 5 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆38Feb 16, 2020Updated 6 years ago
- ☆60Aug 11, 2023Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Nov 11, 2022Updated 3 years ago
- Speak to your shell using various metaphors sourced from differing cultural dialects.☆14Jan 14, 2021Updated 5 years ago
- ☆43Oct 28, 2016Updated 9 years ago
- ☆10Oct 25, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A tool for creating proxy dll for hijacking☆42Oct 28, 2024Updated last year
- Download your Ring doorbell videos from The Cloud™☆13Dec 10, 2022Updated 3 years ago
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 7 years ago
- ProcessHollowing via csharp☆13Dec 21, 2021Updated 4 years ago
- Powershell modules and commands that come in handy for pentests and red team assessments.☆21Oct 31, 2018Updated 7 years ago
- This repository stores the proof-of-concept of Windows malware categorized with MITRE ATT&CK.☆14Nov 8, 2024Updated last year
- An example of a mis-configured Rails application release under MIT license.☆21Jan 19, 2023Updated 3 years ago
- A collection of awesome software, libraries, documents, books, resources and cool stuff about industrial control systems in cybersecurity…☆35Feb 9, 2025Updated last year
- A curated list of resources related to Industrial Control System (ICS) security.☆32May 27, 2016Updated 9 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Collection of the cheat sheets useful for pentesting☆10May 11, 2018Updated 7 years ago
- ☆16Nov 14, 2016Updated 9 years ago
- A simple log analyzer which detects bruteforce attempts and prevents them by addin iptables rules.☆16Nov 27, 2023Updated 2 years ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆50May 8, 2024Updated last year
- All the common commands used in a red teaming operation or CTF. This is a work in progress and will be updated with time.☆41Jul 21, 2020Updated 5 years ago
- Personal repository with handy cheatsheets.☆16Oct 23, 2016Updated 9 years ago
- ☆38Mar 4, 2020Updated 6 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated last year
- 🐳 Docker based Golang development environment☆12Nov 15, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A Lighthaus theme for Fish Shell☆14Jan 10, 2023Updated 3 years ago
- Searches for Insider Threat Hunting☆29May 2, 2019Updated 6 years ago
- Convert IP addresses to emojis☆14Jan 11, 2023Updated 3 years ago
- Helm charts for deploying Malcolm☆16Updated this week
- Bypass AMSI☆13Aug 8, 2021Updated 4 years ago
- A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.☆13Apr 1, 2019Updated 6 years ago
- IP camera bruteforcer, 32 bit version☆14Mar 24, 2016Updated 10 years ago