sourcefrenchy / DEFCON-30---Exotic-Data-ExfiltrationView external linksLinks
Slides from my talk at the Adversary Village, Defcon 30
☆29Nov 11, 2022Updated 3 years ago
Alternatives and similar repositories for DEFCON-30---Exotic-Data-Exfiltration
Users that are interested in DEFCON-30---Exotic-Data-Exfiltration are comparing it to the libraries listed below
Sorting:
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆17May 7, 2021Updated 4 years ago
- C code to enable ETW tracing for Dotnet Assemblies☆32Aug 12, 2022Updated 3 years ago
- A spiritual .NET equivalent to the Gargoyle memory scanning evasion technique☆52Dec 6, 2018Updated 7 years ago
- Notes template for Offensive Security's EXP-301 course and OSED exam☆21Mar 4, 2022Updated 3 years ago
- Teamsniper is a tool for fetching keywords in a Microsoft Teams such as (passwords, emails, database, etc.).☆199Sep 19, 2022Updated 3 years ago
- ☆78Oct 18, 2022Updated 3 years ago
- A Couple of Python Scripts Leveraging MS365's GraphAPI to Send Custom Calendar Events / Emails from Cheap O365 Accounts☆18Apr 19, 2024Updated last year
- Ffuf output browser☆39Feb 25, 2023Updated 2 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- Minimalist Custom .NET Core Garbage Collector☆23Jun 15, 2020Updated 5 years ago
- Microsoft External Attack Tool☆178Dec 8, 2022Updated 3 years ago
- Running .NET from VBA☆149Feb 11, 2023Updated 3 years ago
- ☆35Sep 13, 2022Updated 3 years ago
- Nim Library for Offensive Security Development☆198Sep 4, 2023Updated 2 years ago
- C# implementation of Shellcode delivery techniques using PInvoke and DInvoke variations for API calling.☆37Dec 20, 2021Updated 4 years ago
- Use GZip to compress your .NET assemblies for loading with AssemblyResolve.☆20Apr 11, 2014Updated 11 years ago
- A small example of loading BOFs in Python with pure reflection☆19Jan 26, 2023Updated 3 years ago
- Playing with PE's and Building Structures by Hand☆22Apr 21, 2022Updated 3 years ago
- Remote code execution in Power Platform connectors via JSON deserialization☆23Mar 30, 2023Updated 2 years ago
- Chequea si tu firewall es vulnerable a CVE-2024-21762 (RCE sin autenticación)☆15Jun 29, 2025Updated 7 months ago
- BH Cypher Queries picked up from random places☆40Dec 12, 2018Updated 7 years ago
- Hookers are cooler than patches.☆170Jan 21, 2022Updated 4 years ago
- Burp Suite extension to detect Web Cache Deception vulnerabilities, now compatible with the Community Edition. Automates advanced cache …☆15Nov 18, 2025Updated 2 months ago
- ☆12Jul 2, 2023Updated 2 years ago
- The best way to send emails in Go.☆12Feb 4, 2021Updated 5 years ago
- A simplistic but fast Web Content Scanner written in nodejs.☆11Jun 5, 2025Updated 8 months ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- ☆12Oct 9, 2022Updated 3 years ago
- ☆15Aug 17, 2023Updated 2 years ago
- ☆12Jun 22, 2022Updated 3 years ago
- Executables on Disk? Bleh 🤮☆111May 11, 2023Updated 2 years ago
- Simple and sane cryptographic wrapper library.☆27Apr 21, 2023Updated 2 years ago
- POC code to crash Windows Event Logger Service☆27Oct 16, 2020Updated 5 years ago
- Targeted Payload Execution☆100Apr 9, 2020Updated 5 years ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆258May 17, 2022Updated 3 years ago
- Simple PoC from Malicious Payload Injection from Windows Event Log Entry☆28Aug 8, 2022Updated 3 years ago
- A CLI for deploying red team infrastructure across mutliple cloud providers, all integrated with a virtual Nebula network, and full ELK i…☆120Jul 23, 2023Updated 2 years ago
- ☆12Apr 7, 2022Updated 3 years ago
- A tool for the lazy OSINTer that focuses on discovery of subdomains related to a specific domain. The tool will run for free in Google Ap…☆12Mar 4, 2021Updated 4 years ago