kleosdc / dns-exfil-infilView external linksLinks
Showcase of DNS Exfiltration and Infiltration
☆60Feb 26, 2021Updated 4 years ago
Alternatives and similar repositories for dns-exfil-infil
Users that are interested in dns-exfil-infil are comparing it to the libraries listed below
Sorting:
- A command line tool to search AttackerKB.☆53Jan 16, 2021Updated 5 years ago
- Just a git repo for the sleepmask detection rule i found in https://codex-7.gitbook.io/codexs-terminal-window/blue-team/detecting-cobalt-…☆16Jun 4, 2025Updated 8 months ago
- Exploits for the TryHackMe room hackerNote☆32Feb 20, 2020Updated 5 years ago
- CTFScore or the "Advanced CTF Scoring System" is a system intended to track the IDS alerts generated during the course of a CTF and provi…☆22Jul 26, 2022Updated 3 years ago
- Basic Website template Django 2.2 Example + Python3☆54Feb 9, 2022Updated 4 years ago
- PackageSpy is a versatile command-line tool designed to simplify the process of searching for packages on two popular package managers☆22Jun 19, 2024Updated last year
- Proof of Concept for CVE-2019-18634☆233Sep 12, 2021Updated 4 years ago
- Detect Remote Local Credentials Dumping using a Shadow Snapshot☆32Jan 27, 2025Updated last year
- Exploits Really Simple Security < 9.1.2 authentication bypass (CVE-2024-10924).☆19Nov 19, 2024Updated last year
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆23Sep 15, 2023Updated 2 years ago
- A safe place to hide all your precious data at.☆25Feb 27, 2025Updated 11 months ago
- LOL's collections☆24Oct 4, 2020Updated 5 years ago
- ☆25Jan 12, 2023Updated 3 years ago
- D2R MapHack☆10Jun 10, 2022Updated 3 years ago
- This project is an Ansible Role to execute Atomic Red Team tests against multiple machines by wrapping Invoke-AtomicRedTeam☆27Jul 4, 2024Updated last year
- Load and execute a common object file format (COFF) in the current process☆32Mar 9, 2024Updated last year
- ☆10Aug 4, 2020Updated 5 years ago
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆29Jan 29, 2024Updated 2 years ago
- Simple 5060 port exploit that calls to a receiver device with pre-setuped phrase☆34Jul 5, 2022Updated 3 years ago
- Mobile android app to access optc-db.github.io☆11May 24, 2018Updated 7 years ago
- Advanced malware sandbox evasion using C☆17Jan 23, 2026Updated 3 weeks ago
- Gixposed is a powerful command-line tool designed to search the commit history of Git repositories for sensitive information, such as API…☆37Dec 13, 2024Updated last year
- Super good awesome☆10Jan 15, 2023Updated 3 years ago
- BruteProxy.py framework for brute-forcing via HTTP/HTTPS requests with looping proxies.☆12Jan 12, 2026Updated last month
- Apix logger for sending logs via PHPMailer.☆10Nov 6, 2017Updated 8 years ago
- GNS3 Topology Converter☆15Jan 28, 2016Updated 10 years ago
- ☆10Jul 8, 2024Updated last year
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆15Oct 31, 2022Updated 3 years ago
- ☆12Updated this week
- Spider and analyze vaadin applications with OWASP ZAP - the app mediates between the two.☆11Nov 24, 2022Updated 3 years ago
- POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20☆10Jun 22, 2024Updated last year
- ShellSweeping the evil.☆181Nov 25, 2024Updated last year
- Tool to aid in dumping LSASS process remotely☆42Sep 23, 2025Updated 4 months ago
- Spring4Shell Proof Of Concept/And vulnerable application CVE-2022-22965☆373Nov 9, 2022Updated 3 years ago
- ☆11Dec 17, 2018Updated 7 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 3 years ago
- Automate Checkmarx Scanning and Onboarding Plus AWS Access☆12Jan 5, 2023Updated 3 years ago
- ☆12Dec 15, 2024Updated last year
- Collection of tools related to 7z, stego, and CTFs☆14Oct 9, 2020Updated 5 years ago