sourcefrenchy / spotexfil
A simple way to exfiltrate data using spotify API
☆18Updated this week
Alternatives and similar repositories for spotexfil:
Users that are interested in spotexfil are comparing it to the libraries listed below
- Exfiltration based on custom X509 certificates☆26Updated 11 months ago
- A mini project to exfiltrate data via QR codes☆19Updated 2 months ago
- ☆17Updated last year
- just manipulatin these here tokens yes sir nothing weird☆22Updated 2 years ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆19Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Data exfiltration and covert communication tool☆38Updated 2 years ago
- ☆11Updated 6 years ago
- A Canary which fires when uninstalled☆34Updated 3 years ago
- A co-simulation framework for reasearching cybersecurity in power grids.☆19Updated 2 months ago
- ☆16Updated 7 years ago
- Firebase Domain Front Code☆21Updated 3 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Updated 4 years ago
- WMI SA stuffs☆29Updated 2 years ago
- Just another useless C2 occupying space in some HDD somewhere.☆20Updated last year
- The repository accompanying the Buer Emulation workshop☆24Updated 3 years ago
- Continuous kerberoast monitor☆44Updated last year
- Finding sensitive information in the trimmed parts of cropped images☆28Updated 3 years ago
- Repository for LNK stuff☆29Updated 2 years ago
- LetMeOutOfYour.net Resources☆20Updated 4 years ago
- Collection of red machine learning projects☆39Updated 3 years ago
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Updated 2 years ago
- Data EXfiltration TestER☆21Updated 5 years ago
- RID Hijacking Proof of Concept script by Kevin Joyce☆15Updated 6 years ago
- ☆13Updated last year
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆20Updated last year
- ☆24Updated 4 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago