Curated list of awesome, open source data exfiltration tools
☆61Oct 30, 2021Updated 4 years ago
Alternatives and similar repositories for awesome-data-exfiltration
Users that are interested in awesome-data-exfiltration are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Data exfiltration and covert communication tool☆39Jan 10, 2023Updated 3 years ago
- A simple way to exfiltrate data using spotify API☆19Apr 20, 2026Updated last month
- reverse engineered and improved BSQLi script from Coffinxp☆15Aug 30, 2024Updated last year
- SQLI labs to test error based, Blind boolean based, Time based.☆17Feb 1, 2019Updated 7 years ago
- Creating a resource to help build and manage an Insider Threat program.☆103Jan 30, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆61Aug 11, 2023Updated 2 years ago
- Noob Penetration tester☆11Jul 17, 2025Updated 10 months ago
- Collection of web app methodology from initial recon into exploit known vulnerability. Used when conducting Bug Bounty, Penetration Testi…☆13Oct 23, 2021Updated 4 years ago
- PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems assoc…☆650Jun 3, 2021Updated 4 years ago
- Old home of LimaCharlie, open source EDR☆32Sep 4, 2023Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Nov 11, 2022Updated 3 years ago
- This repository offers a detailed taxonomy of existing AI-driven security solutions tailored for DevSecOps, highlighting the current rese…☆20Jul 2, 2025Updated 10 months ago
- ☆13Aug 13, 2021Updated 4 years ago
- ☆43Oct 28, 2016Updated 9 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆10Oct 25, 2020Updated 5 years ago
- Download your Ring doorbell videos from The Cloud™☆13Dec 10, 2022Updated 3 years ago
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 7 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆64May 31, 2020Updated 5 years ago
- AgentRE-Bench is an agentic benchmark that evaluates state-of-the-art models on long-horizon reverse engineering tasks, measuring their a…☆58Updated this week
- ProcessHollowing via csharp☆13Dec 21, 2021Updated 4 years ago
- A collection of awesome software, libraries, documents, books, resources and cool stuff about industrial control systems in cybersecurity…☆36Feb 9, 2025Updated last year
- Collection of the cheat sheets useful for pentesting☆10May 11, 2018Updated 8 years ago
- ☆16Nov 14, 2016Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Personal repository with handy cheatsheets.☆16Oct 23, 2016Updated 9 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Updated this week
- A Lighthaus theme for Fish Shell☆14Jan 10, 2023Updated 3 years ago
- python exploit for werkzeug debug shell command execution☆10Jun 26, 2017Updated 8 years ago
- Convert IP addresses to emojis☆14Jan 11, 2023Updated 3 years ago
- CTF Writeups for the UW CTF Team☆15Dec 4, 2019Updated 6 years ago
- Silk File Reader☆14Mar 9, 2022Updated 4 years ago
- Egress-Assess is a tool used to test egress data detection capabilities☆708Aug 9, 2023Updated 2 years ago
- Bypass AMSI☆13Aug 8, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- IP camera bruteforcer, 32 bit version☆14Mar 24, 2016Updated 10 years ago
- Primary data pipelines for intrusion detection, security analytics and threat hunting☆85Jan 9, 2022Updated 4 years ago
- WigleAPI-JSON in PHP with JSON Response☆14Nov 18, 2013Updated 12 years ago
- ☆14May 10, 2023Updated 3 years ago
- Information gathering tool using OSINT and AI☆17Nov 21, 2024Updated last year
- Vendor Library .net HI Client providing implementations for searching IHI, HPI-I and HPI-O numbers from the Health Identifiers Service..☆16Apr 13, 2026Updated last month
- docker-microtsocks☆11Sep 7, 2023Updated 2 years ago