ekiojp / dfexLinks
DNS File EXfiltration
☆46Updated last year
Alternatives and similar repositories for dfex
Users that are interested in dfex are comparing it to the libraries listed below
Sorting:
- ☆38Updated 5 years ago
- ☆1Updated 6 years ago
- ☆23Updated 4 years ago
- Data exfiltration utility for testing detection capabilities☆58Updated 3 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Updated 2 years ago
- Methods of C2☆21Updated 10 years ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆36Updated 7 years ago
- ☆60Updated 5 years ago
- ☆21Updated 5 years ago
- Remote Java classpath enumeration via deserialization☆22Updated 2 years ago
- Alphanumeric Encoder☆25Updated 6 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆37Updated 5 years ago
- Mailpl0it is a small utility that hunts the homepage of exploit-db looking for user supplied quer(y/ies) and notifies the user via email …☆31Updated 2 years ago
- Some of my public exploits☆51Updated 4 years ago
- ☆30Updated 6 years ago
- Helper scripts to assist penetration testing and exploit development☆36Updated 7 months ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- ☆45Updated 6 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆38Updated 5 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Updated 5 years ago
- Impacket is a collection of Python classes for working with network protocols.☆17Updated 5 years ago
- miscellaneous stuff☆21Updated 10 years ago
- All about CVE-2018-14667; From what it is to how to successfully exploit it.☆50Updated 6 years ago
- Kubernetes Scanner☆40Updated 3 years ago
- ☆34Updated 6 years ago
- Generate pentest reports based on github issues.☆17Updated 2 years ago
- Automated 802.1x Bypass☆86Updated 5 years ago
- A simple grep user interface for searching code which can be used for SAST.☆8Updated 5 years ago
- Standalone POCs/Exploits from various sources for Jok3r☆28Updated 4 years ago
- ☆25Updated 4 years ago