Simple DNS exfiltration using base64-encoded URL's
☆14Jul 25, 2017Updated 8 years ago
Alternatives and similar repositories for dns_exfiltration
Users that are interested in dns_exfiltration are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆17May 2, 2024Updated last year
- ☆21Apr 30, 2020Updated 5 years ago
- ☆18Feb 4, 2014Updated 12 years ago
- Under Your Radar (UYR): Exfiltration using Steganography☆18Mar 28, 2015Updated 10 years ago
- An agent that performs user actions on a workstation☆13Jan 22, 2018Updated 8 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Read-Eval-Print-Loop (REPL) for coc.nvim☆13Dec 9, 2022Updated 3 years ago
- Convert OpenVPN profiles to an APC file that can be imported into a Sophos/Astaro UTM☆14Nov 16, 2015Updated 10 years ago
- Go package to parse Bitcoin Core's mempool.dat file☆10Jun 16, 2019Updated 6 years ago
- A tiny set of helper scripts for ipinfo☆17Aug 7, 2020Updated 5 years ago
- Zoho ManageEngine Desktop Central CVEs☆15Oct 5, 2020Updated 5 years ago
- Plugin that serves the ATT&CK website alongside CALDERA.☆13Feb 24, 2020Updated 6 years ago
- Python script to monitor new Pastebin pastes for a provided search term☆18Aug 6, 2012Updated 13 years ago
- Fix Nvim's streamed pasting. Supports Normal, Visual, Select, Insert, Terminal, and Cmdline modes. Compatible with Nvim v0.4.0 and above.☆10Nov 14, 2022Updated 3 years ago
- Small and highly portable detection tests.☆12Oct 12, 2017Updated 8 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Exfiltrate blind remote code execution output over DNS via Burp Collaborator.☆12Apr 26, 2020Updated 5 years ago
- Static file analysis for PE files☆13Dec 4, 2020Updated 5 years ago
- SIEM Detection Use Case Library mapped to MITRE ATT&CK tactics and techniques☆12Oct 28, 2018Updated 7 years ago
- Pre-configured environment that supports the development and running of OpenDXL solutions☆13Mar 29, 2021Updated 4 years ago
- ARP ping detector on local network☆15Feb 3, 2013Updated 13 years ago
- A curated list of CTF frameworks, libraries, resources and softwares☆10Nov 11, 2015Updated 10 years ago
- learning related projects☆17Jan 26, 2015Updated 11 years ago
- Python command-line tool that uses nearest neighbor search methods for malware similarity analysis☆16Jan 29, 2019Updated 7 years ago
- Fastest way to run prettier for a single file. Fork of https://github.com/ruyadorno/eslintme☆16Nov 3, 2020Updated 5 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A curated list of awesome threat detection and hunting resources☆10Mar 23, 2018Updated 8 years ago
- Automatically create directories☆10Dec 19, 2020Updated 5 years ago
- A bunch of useful SSH tools for powershell☆120Oct 24, 2018Updated 7 years ago
- A desktop App to add STIX-2 objects to TAXII-2.0 servers☆11Mar 13, 2019Updated 7 years ago
- An OS X kernel module that protects a userland process from being terminated in any way☆14Dec 7, 2015Updated 10 years ago
- Kickstarts and such for various cloud starter images☆14Jun 1, 2015Updated 10 years ago
- Decoding of datetime values contained in JSON streams. A wrapper around simplejson `loads` method.☆13Dec 9, 2022Updated 3 years ago
- Burp Suite extension to perform Kerberos authentication☆12Jan 19, 2026Updated 2 months ago
- Oracle Attacks Tool☆13Aug 9, 2016Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆12Aug 10, 2024Updated last year
- Collection of scripts that I have used on Red Team engagements☆16Feb 15, 2018Updated 8 years ago
- DINP中用于制作base image的Dockerfile☆13Feb 8, 2015Updated 11 years ago
- ☆17Mar 9, 2016Updated 10 years ago
- YALIH (Yet Another Low Interaction Honeyclient) is a low Interaction Client honeypot designed to detect malicious websites through signat…☆68Jun 18, 2019Updated 6 years ago
- Attack-defense platform☆27Jun 26, 2019Updated 6 years ago
- docker images☆13Oct 23, 2017Updated 8 years ago