ekiojp / dfex
DNS File EXfiltration
☆46Updated last year
Alternatives and similar repositories for dfex
Users that are interested in dfex are comparing it to the libraries listed below
Sorting:
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 3 years ago
- AWS S3 Bucket/Object Finder☆24Updated 7 years ago
- This repo will contain slides and information from the Attacking Active Directory Hacking Series talks presented at SecKC.☆32Updated 10 months ago
- ☆1Updated 6 years ago
- ☆38Updated 4 years ago
- Alphanumeric Encoder☆25Updated 6 years ago
- ☆23Updated 4 years ago
- ☆11Updated 2 years ago
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Updated 4 years ago
- A tool for creating proxy dll for hijacking☆42Updated 6 months ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- Mailpl0it is a small utility that hunts the homepage of exploit-db looking for user supplied quer(y/ies) and notifies the user via email …☆31Updated 2 years ago
- Samba, NFS shares spider and grepper☆70Updated 6 years ago
- BlueKeep powershell scanner (based on c# code)☆39Updated 5 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Updated 2 years ago
- Oracle Database Penetration Testing Reference (10g/11g)☆36Updated 6 years ago
- A simple grep user interface for searching code which can be used for SAST.☆8Updated 5 years ago
- BurpSuite's payload-generation extension aiming at applying fuzzed test-cases depending on the type of payload (integer, string, path; JS…☆41Updated 4 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆30Updated 7 years ago
- ☆56Updated 5 years ago
- Generate pentest reports based on github issues.☆17Updated 2 years ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Updated 6 years ago
- ☆36Updated 6 years ago
- ☆30Updated 6 years ago
- Remote Java classpath enumeration via deserialization☆22Updated last year
- ☆21Updated 5 years ago
- Kubernetes Scanner☆40Updated 3 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 5 years ago
- ☆25Updated 4 years ago