m57 / dnstealLinks
DNS Exfiltration tool for stealthily sending files over DNS requests.
☆1,733Updated 4 years ago
Alternatives and similar repositories for dnsteal
Users that are interested in dnsteal are comparing it to the libraries listed below
Sorting:
- Sniffs sensitive data from interface or pcap☆1,810Updated 2 years ago
- A DNS reconnaissance tool for locating non-contiguous IP space.☆1,760Updated last year
- A fully featured backdoor that uses Twitter as a C&C server☆788Updated 5 years ago
- A PoC backdoor that uses Gmail as a C&C server☆1,346Updated 7 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆828Updated 8 years ago
- online port scan scraper☆1,120Updated 2 years ago
- A post-exploitation powershell tool for extracting juicy info from memory.☆1,865Updated last year
- NetRipper - Smart traffic sniffing for penetration testers☆1,384Updated 3 years ago
- Just-Metadata is a tool that gathers and analyzes metadata about IP addresses. It attempts to find relationships between systems within …☆629Updated last year
- Patch Binaries via MITM: BackdoorFactory + mitmProxy.☆1,010Updated 4 years ago
- SSH man-in-the-middle tool☆1,732Updated 4 years ago
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,322Updated 4 years ago
- A fast and stealthy credential harvester☆627Updated 2 years ago
- Network Infrastructure Penetration Testing Tool☆1,670Updated 4 years ago
- ☆3,829Updated last year
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based S…☆1,649Updated 5 years ago
- A default credential scanner.☆1,502Updated 7 months ago
- Kippo - SSH Honeypot☆1,709Updated 2 years ago
- powerful auto-backdooring utility☆748Updated 8 years ago
- A tool to dump the login password from the current linux user☆4,079Updated 5 months ago
- The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.☆1,042Updated 4 years ago
- A collection of static SSH keys (public and private) that have made their way into software and hardware products.☆846Updated 11 months ago
- All your IPs are belong to us.☆676Updated 7 years ago
- Command line utility for searching and downloading exploits☆1,811Updated 5 months ago
- Extracts passwords from a KeePass 2.x database, directly from memory.☆1,017Updated 10 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,826Updated 5 years ago
- An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector☆1,019Updated 8 years ago
- Malcom - Malware Communications Analyzer☆1,166Updated 8 years ago
- wide range mass audit toolkit☆1,034Updated 7 years ago
- Post Exploitation Collection☆1,571Updated 5 years ago