Showcase of DNS Exfiltration and Infiltration
☆59Feb 26, 2021Updated 5 years ago
Alternatives and similar repositories for dns-exfil-infil
Users that are interested in dns-exfil-infil are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆16Apr 12, 2018Updated 7 years ago
- Created for my TryHackMe room☆183Dec 31, 2019Updated 6 years ago
- Basic Website template Django 2.2 Example + Python3☆54Feb 9, 2022Updated 4 years ago
- Exploits for the TryHackMe room hackerNote☆32Feb 20, 2020Updated 6 years ago
- A handfull of writeups☆15Jul 1, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Just a git repo for the sleepmask detection rule i found in https://codex-7.gitbook.io/codexs-terminal-window/blue-team/detecting-cobalt-…☆16Jun 4, 2025Updated 10 months ago
- Prints windows exe header and export/import info☆10May 6, 2022Updated 3 years ago
- Zerofox Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆46Mar 2, 2020Updated 6 years ago
- CTFScore or the "Advanced CTF Scoring System" is a system intended to track the IDS alerts generated during the course of a CTF and provi…☆22Jul 26, 2022Updated 3 years ago
- DNS Dashboard for hunting and identifying beaconing☆16Jul 29, 2020Updated 5 years ago
- High-speed Go email scraper that crawls sites and internal links concurrently to collect email addresses for reconnaissance, research, or…☆31Dec 18, 2025Updated 3 months ago
- 🔐 teler Proxy enabling seamless integration with teler WAF 🛡️ to protect locally running web service against a web-based attacks. 🥷☆51Feb 24, 2025Updated last year
- Detect Remote Local Credentials Dumping using a Shadow Snapshot☆32Jan 27, 2025Updated last year
- Code repository for Hands-on PowerShell for Active Directory, Published By Packt☆14Jan 30, 2023Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆22Sep 15, 2023Updated 2 years ago
- Automatically perform advanced NTLM hash relay attacks☆15Nov 4, 2022Updated 3 years ago
- PoC of five Slow Rate HTTP/2 DoS attacks seen in a research paper☆10Mar 31, 2018Updated 8 years ago
- evtx2json extracts events of interest from event logs, dedups them, and exports them to json.☆41May 3, 2021Updated 4 years ago
- Help deobfuscate VBScript☆18Jul 1, 2022Updated 3 years ago
- Real time graph generator of the network topology using traceroute, nmap and arborJS☆12Dec 1, 2013Updated 12 years ago
- This extension is meticulously crafted to safeguard users from phishing attempts that replicate the Office365 login interface, particular…☆11Nov 27, 2023Updated 2 years ago
- Rasengan is a command-line tool for automated testing of multiple kind of integrations tests for domains, with a simple and flexible YAM…☆13May 11, 2018Updated 7 years ago
- ShellSweeping the evil.☆181Nov 25, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆14Jan 2, 2025Updated last year
- command line tool to use the DNSDB Flexible Search API extensions.☆16Aug 5, 2024Updated last year
- Using Just In Time (JIT) instruction decryption, this shellcode loader ensures that only the currently executing instruction is visible i…☆64Apr 2, 2025Updated last year
- nmapParser.py is a tool developed for consultants doing nmap scans against a large range of hosts. I found it easy to identify hosts that…☆13Jan 19, 2016Updated 10 years ago
- Personal website, darkstar7471.com☆11Dec 16, 2021Updated 4 years ago
- Snake game written in PowerShell which uses any windows console (cmd.exe, powershell.exe, even VSCode) and draws out a custom native code…☆14Mar 25, 2025Updated last year
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆255Oct 29, 2025Updated 5 months ago
- 0xGame 2024 challenges and writeups☆14Jan 26, 2025Updated last year
- My personal home network setup☆19Apr 6, 2025Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Host Discovery Tool☆10Jan 17, 2022Updated 4 years ago
- Load and execute a common object file format (COFF) in the current process☆30Mar 9, 2024Updated 2 years ago
- CVE-2024-44000 is a vulnerability in the LiteSpeed Cache plugin, a popular WordPress plugin. This vulnerability affects session managemen…☆15Sep 6, 2024Updated last year
- A tool to keep AWS pentests and red teams efficient, organized, and stealthy.☆96Dec 29, 2025Updated 3 months ago
- Simple 5060 port exploit that calls to a receiver device with pre-setuped phrase☆34Jul 5, 2022Updated 3 years ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆15Feb 25, 2022Updated 4 years ago
- Random tips and tricks RE: ransomware☆14Aug 17, 2021Updated 4 years ago