sourcefrenchy / spotexfilLinks
A simple way to exfiltrate data using spotify API
☆18Updated 3 weeks ago
Alternatives and similar repositories for spotexfil
Users that are interested in spotexfil are comparing it to the libraries listed below
Sorting:
- Exfiltration based on custom X509 certificates☆26Updated last year
- A mini project to exfiltrate data via QR codes☆19Updated last month
- s3eker is an extensible way to find open S3 buckets.☆17Updated 4 years ago
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- Collection of red machine learning projects☆40Updated 3 years ago
- A Canary which fires when uninstalled☆34Updated 4 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆15Updated 3 years ago
- wordlists for password cracking☆28Updated 2 years ago
- visually see issues with supported cipher suites☆16Updated last year
- Continuous kerberoast monitor☆45Updated last year
- Data exfiltration and covert communication tool☆39Updated 2 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- C# User Simulation☆32Updated 2 years ago
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆20Updated 2 years ago
- Automated Payload Test Controller☆10Updated 8 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Updated 3 years ago
- Reproducible and extensible BloodHound playbooks☆44Updated 5 years ago
- LetMeOutOfYour.net Resources☆20Updated 4 years ago
- Tools for playing w/ CobaltStrike config - extractin, detection, processing, etc...☆30Updated 2 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Updated 6 years ago
- Exploit PoC for CVE's and non CVE's alike☆22Updated 4 years ago
- Test Azure environment for MFA misconfigurations☆12Updated 2 years ago
- Repository for LNK stuff☆30Updated 2 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆22Updated last year
- ☆24Updated 3 years ago
- parsers to make life easier☆13Updated 4 years ago
- ☆18Updated last year
- Exploit for win10 SMB3.1☆17Updated 5 years ago
- ☆20Updated 5 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 5 months ago