A mini project to exfiltrate data via QR codes
☆19Dec 5, 2025Updated 3 months ago
Alternatives and similar repositories for goqrexfil
Users that are interested in goqrexfil are comparing it to the libraries listed below
Sorting:
- Exfiltration based on custom X509 certificates☆26Feb 23, 2024Updated 2 years ago
- A simple way to exfiltrate data using spotify API☆20Feb 11, 2026Updated 3 weeks ago
- Security diagnostic quick start guide. Identifying the best measures and establishing specific security procedures for your organization.☆11May 29, 2019Updated 6 years ago
- ☆10Apr 10, 2024Updated last year
- tools for creating, inspecting and modifying torrent files☆13Jun 1, 2022Updated 3 years ago
- A statistical framework for graph anomaly detection.☆17Sep 23, 2018Updated 7 years ago
- IoC Feed for security analysts etc.☆13Feb 1, 2023Updated 3 years ago
- 🐾Dogwalk PoC (using diagcab file to obtain RCE on windows)☆78Aug 11, 2022Updated 3 years ago
- Pwnage☆17Jul 1, 2025Updated 8 months ago
- create a "simulated internet" cyber range environment☆19Jan 28, 2026Updated last month
- Visual Studio Code Microsoft Sysinternal Sysmon configuration file extension.☆54Jul 13, 2023Updated 2 years ago
- Base45☆22Feb 20, 2026Updated last week
- A spiritual .NET equivalent to the Gargoyle memory scanning evasion technique☆52Dec 6, 2018Updated 7 years ago
- Look into EDR events from network☆25Nov 20, 2025Updated 3 months ago
- C# implementation of Shellcode delivery techniques using PInvoke and DInvoke variations for API calling.☆37Dec 20, 2021Updated 4 years ago
- A mirror of several precompiled standalone red-teaming tools.☆19Feb 2, 2023Updated 3 years ago
- Exploit for Arbitrary File Move vulnerability in ZoneAlarm AV☆26Sep 26, 2022Updated 3 years ago
- A Python implementation of the Community ID flow hashing standard☆23Nov 29, 2023Updated 2 years ago
- (Abandoned) Extract packages from an Android device☆53Apr 9, 2021Updated 4 years ago
- Library for streaming data and incremental learning algorithms.☆26Sep 17, 2025Updated 5 months ago
- Scapy Penetration testing scripts☆21May 26, 2015Updated 10 years ago
- A Red Teaming tool focused on profiling the target.☆29Jan 10, 2026Updated last month
- Finding all things on-prem Microsoft for password spraying and enumeration.☆257May 17, 2022Updated 3 years ago
- Simulation of Industrial process unit on ESP32 board with ModbusTCP interface☆22Sep 19, 2020Updated 5 years ago
- DDoor - cross platform backdoor using dns txt records☆30Sep 27, 2021Updated 4 years ago
- Pure Python implementation of the XZ file format with random access support☆29Oct 18, 2025Updated 4 months ago
- Ansible role to install Cobalt Strike and optionally configure as Teamserver☆33Mar 17, 2021Updated 4 years ago
- Searches open files shares for password files, database backups, etc. Extend as you see fit☆29Dec 13, 2019Updated 6 years ago
- WMI SA stuffs☆30Apr 18, 2022Updated 3 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Nov 11, 2022Updated 3 years ago
- Use md5-collisions to make evil executables looking like a good one.☆34Apr 23, 2020Updated 5 years ago
- Custom pentesting tools☆26Nov 17, 2020Updated 5 years ago
- A collection of searches, interesting events and tables on Crowdstrike Splunk.☆30Mar 2, 2021Updated 5 years ago
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆34Feb 2, 2026Updated last month
- Convert ldapdomaindump to Bloodhound☆80Dec 19, 2023Updated 2 years ago
- Google Cloud Security Command Center to Azure Sentinel Connector☆19Jul 15, 2023Updated 2 years ago
- ☆79Aug 2, 2023Updated 2 years ago
- Automated detection rule analysis utility☆28Sep 22, 2022Updated 3 years ago
- Yet another way to find where to report an abuse☆31Jan 25, 2025Updated last year