secret_sender is a program that manipulates the IP packet to send a message accepted from command line through one of the protocols (TCMP Echo Request, TCP SYN or UDP) to exfiltrate data onto a server. Since it looks like a normal packet to the server, it does not suspect anything.
☆14Jun 3, 2017Updated 8 years ago
Alternatives and similar repositories for Data-Exfiltration
Users that are interested in Data-Exfiltration are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Uninvited Guest - A file server for files over DNS TXT records☆22Sep 27, 2024Updated last year
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆11Mar 12, 2026Updated last week
- An Ansible role to install and configure the ZNC IRC bouncer server.☆10Aug 4, 2019Updated 6 years ago
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago
- Tool to extract contents from the memory of Windows systems.☆13Jul 4, 2023Updated 2 years ago
- ELF64 Relocatable Object Loader☆27Nov 30, 2017Updated 8 years ago
- Remake of OSIF by CiKu370☆15Dec 17, 2020Updated 5 years ago
- ☆21Jun 9, 2023Updated 2 years ago
- Tool for Atheros ART partition☆11Oct 9, 2017Updated 8 years ago
- Decrypts blowfish (w. static key) encrypted hMail database password.☆15Feb 21, 2018Updated 8 years ago
- Predicting the probability of an exploit being released after a CVE is published (by Machine learning algorithm)☆13Aug 8, 2023Updated 2 years ago
- ☆11Dec 6, 2020Updated 5 years ago
- Ansible role to install ZNC☆10Aug 17, 2019Updated 6 years ago
- A Golang API for TheHive☆13Sep 3, 2020Updated 5 years ago
- LPE of CVE-2024-26230☆23Sep 1, 2024Updated last year
- Adds a Spy option to the React Native development menu☆14Jan 2, 2019Updated 7 years ago
- ☆14Jul 1, 2019Updated 6 years ago
- ☆12Aug 1, 2017Updated 8 years ago
- ☆30Jul 17, 2018Updated 7 years ago
- Open Source Image Duplicator - Python☆35Mar 1, 2022Updated 4 years ago
- cidrgen is based on cidr's subnet IP list generator☆15Aug 21, 2020Updated 5 years ago
- Tool to scrape LinkedIn☆10Mar 16, 2017Updated 9 years ago
- A Logstash neo4j output☆12Nov 8, 2021Updated 4 years ago
- Golang tool to scan hosts for SMB version and signing status☆15Nov 19, 2024Updated last year
- tool for extracting the paths of files included in xcode project targets☆18May 26, 2016Updated 9 years ago
- POC script for the ManageEngine Multiple Products Authenticated File Upload Exploit☆13Jun 26, 2017Updated 8 years ago
- Generating Cloudfront cookies using static HTML pages☆10Sep 6, 2018Updated 7 years ago
- Code from CCS paper: The Closer You Look, The More You Learn: A Grey-box Approach to Protocol State Machine Learning☆13Feb 27, 2023Updated 3 years ago
- Provides a detailed dashboard for viewing Amazon WorkSpaces usage and provides scripts to facilitate billing mode conversions to reduce c…☆12Jul 7, 2022Updated 3 years ago
- ☆16Oct 12, 2017Updated 8 years ago
- AWS Certified Solutions Architect Professional 2020 - SAP-C01☆10Dec 1, 2019Updated 6 years ago
- Talos Decryptor POC for Remcos RAT version 2.0.5 and earlier☆24Aug 2, 2018Updated 7 years ago
- The source code for Balanced Battle Network 3☆13Feb 25, 2026Updated last month
- Collection of scripts to p*wn mainframes☆16Sep 20, 2017Updated 8 years ago
- Broadcom Image Editor tool☆20Oct 3, 2019Updated 6 years ago
- Phone Number Gathering & OSINT Tool. Collects Phone Numbers and Performs OSINT on the Numbers. Only works on Nigerian Numbers at the mome…☆14Aug 25, 2020Updated 5 years ago
- A Command-Line Tool for Efficient Remote Android Device Management. Utilizes DeviceFarmer's API and ADB for streamlined execution of comm…☆25Jan 22, 2025Updated last year
- ☆31Jun 30, 2013Updated 12 years ago
- Some drivers I've written while solving exercises from Practical Reverse Engineering☆15Jan 9, 2022Updated 4 years ago