ekiojp / dfexLinks
DNS File EXfiltration
☆46Updated last year
Alternatives and similar repositories for dfex
Users that are interested in dfex are comparing it to the libraries listed below
Sorting:
- ☆38Updated 5 years ago
- Alphanumeric Encoder☆25Updated 7 years ago
- Cyberdelia, a Collection of Command and Control frameworks☆64Updated 5 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆93Updated 6 years ago
- WStalker: an easy proxy☆25Updated 5 years ago
- ☆23Updated 4 years ago
- ☆60Updated 5 years ago
- Burp extension to decode NTLM SSP headers and extract domain/host information☆32Updated 4 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Updated 2 years ago
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆125Updated 2 years ago
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆36Updated 7 years ago
- Helper scripts to assist penetration testing and exploit development☆35Updated 10 months ago
- Terraform resources for building HTTP, DNS, phishing, and mail server red team infrastructure☆95Updated 6 years ago
- AWS S3 Bucket/Object Finder☆25Updated 7 years ago
- A basic AIX enumeration guide for penetration testers/red teamers☆33Updated 8 years ago
- My python3 implementation of a Forward Shell☆36Updated 6 years ago
- miscellaneous stuff☆21Updated 10 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆39Updated 5 years ago
- ☆25Updated 5 years ago
- Oracle Database Penetration Testing Reference (10g/11g)☆38Updated 7 years ago
- .NET Deserialization Passive Scanner☆46Updated 7 years ago
- This repo will contain slides and information from the Attacking Active Directory Hacking Series talks presented at SecKC.☆32Updated last year
- Mailpl0it is a small utility that hunts the homepage of exploit-db looking for user supplied quer(y/ies) and notifies the user via email …☆31Updated 3 years ago
- Standalone POCs/Exploits from various sources for Jok3r☆29Updated 4 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Updated 5 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 4 years ago
- ☆30Updated 6 years ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- Remote Java classpath enumeration via deserialization☆22Updated 2 years ago