Data exfiltration using DNS
☆26Dec 28, 2019Updated 6 years ago
Alternatives and similar repositories for exodus
Users that are interested in exodus are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- RipGit - Scanner/Scraper of git source deployed☆15Jan 17, 2019Updated 7 years ago
- PoC for the CVE-2021-4034 vulnerability, affecting polkit < 0.120.☆24Jan 26, 2022Updated 4 years ago
- client & server that can be used to transfer data from a client to a DNS server using DNS only.☆12Mar 30, 2021Updated 4 years ago
- cidrgen is based on cidr's subnet IP list generator☆15Aug 21, 2020Updated 5 years ago
- Pentester-focused Docker registry tool to enumerate and pull images☆36Oct 19, 2025Updated 5 months ago
- This Burp extension helps you to find usages of postMessage and recvMessage☆14Feb 20, 2020Updated 6 years ago
- Python script to detect bluekeep vulnerability (CVE-2019-0708) with TLS/SSL and x509 support☆27Jun 12, 2019Updated 6 years ago
- Some drivers I've written while solving exercises from Practical Reverse Engineering☆15Jan 9, 2022Updated 4 years ago
- ☆16Nov 11, 2022Updated 3 years ago
- HTTP requests of FrontPage expolit☆25Dec 19, 2013Updated 12 years ago
- Native Powers Talk demos☆15Jan 30, 2026Updated last month
- CTF platform we wrote and used for justCTF 2019☆12Jun 25, 2022Updated 3 years ago
- ☆16Aug 29, 2023Updated 2 years ago
- JavaScript Static Code Analysis☆25Jan 14, 2015Updated 11 years ago
- Hooking Heavens Gate in a weekend☆13Jan 1, 2022Updated 4 years ago
- URL-encode data streams via commandline☆14Oct 26, 2019Updated 6 years ago
- ☆16Sep 9, 2021Updated 4 years ago
- ☆16Jul 21, 2018Updated 7 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- Dump exposed HTTP .git fast☆51Nov 11, 2022Updated 3 years ago
- event shipper for Carbon Black Defense notifications☆10Feb 25, 2023Updated 3 years ago
- A PoC for CVE-2022-2588 that triggers a WARNING☆10Sep 28, 2022Updated 3 years ago
- This tool was created as a Proof of Concept to reveal the threats related to web service misconfiguration using CloudFlare as reverse pr…☆14Feb 20, 2023Updated 3 years ago
- Query the 'PublicWWW' Source Code Search Engine in R☆13May 2, 2018Updated 7 years ago
- Detect and extract hidden files☆22Aug 29, 2024Updated last year
- Implements a MVC-like platform in a WordPress site.☆11Oct 18, 2019Updated 6 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Jan 14, 2021Updated 5 years ago
- ☆18Oct 22, 2025Updated 5 months ago
- AvBuster The stress Tester for your Anti Malware solutions☆41Feb 12, 2021Updated 5 years ago
- Offensive Terraform module which creates EC2 instance and reverse shell from an EC2 instance to attacker machine.☆16Sep 19, 2020Updated 5 years ago
- Just a place to share some things I've written while participating in Hack The Box.☆18Jun 5, 2020Updated 5 years ago
- Simple DNS exfiltration using base64-encoded URL's☆14Jul 25, 2017Updated 8 years ago
- Grab unsaved Notepad contents with a Beacon Object File☆11Jun 19, 2022Updated 3 years ago
- Ransoblin (Ransomware Bokoblin)☆18Oct 4, 2020Updated 5 years ago
- A tool for secrets management, encryption as a service, and privileged access management☆12Jul 17, 2025Updated 8 months ago
- Ossec cookbook for Chef, with secure & automated key management☆21Jun 13, 2013Updated 12 years ago
- Tool to acquire netNTLM hashes on a local machine wihtout network traffic☆13May 18, 2018Updated 7 years ago
- Tool to identify all domains contained in an IP anonymously☆15Jun 4, 2017Updated 8 years ago
- Google Maps API checker☆79Feb 26, 2026Updated 3 weeks ago