A simple way to exfiltrate data using spotify API
☆20Feb 11, 2026Updated last month
Alternatives and similar repositories for spotexfil
Users that are interested in spotexfil are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Exfiltration based on custom X509 certificates☆26Feb 23, 2024Updated 2 years ago
- A mini project to exfiltrate data via QR codes☆19Dec 5, 2025Updated 3 months ago
- Caesar-Cipher based encryption☆29Mar 1, 2021Updated 5 years ago
- Presentation Slides and Resources☆16Jun 12, 2024Updated last year
- Zeek Profinet I/O Context Manager Parser - CISA ICSNPP☆14Nov 19, 2025Updated 4 months ago
- LobotoMl is a set of scripts and tools to assess production deployments of ML services☆10May 16, 2022Updated 3 years ago
- A collection of sample code used in some experiments with Sliver C2☆16Mar 28, 2023Updated 2 years ago
- Library Secruity dependency Checker☆12Sep 13, 2019Updated 6 years ago
- ☆18Jul 3, 2020Updated 5 years ago
- Unofficial Iranian hackers group disk wiper malware aka "Shamoon" in .NET 2.0☆13Dec 23, 2018Updated 7 years ago
- All the content from my Troopers 19 talk☆12Mar 20, 2019Updated 7 years ago
- ☆13Jun 15, 2024Updated last year
- Bundle of security analysis scripts for keras tensorflow models☆16Apr 15, 2024Updated last year
- A security-first linter for code that shouldn't need linting☆18Sep 12, 2023Updated 2 years ago
- 📄 [Talk] OFFZONE 2022 / ODS Data Halloween 2022: Black-box attacks on ML models + with use of open-source tools☆14May 23, 2023Updated 2 years ago
- super-Django-CC is a simle web interface for commoncrawl.org☆15Dec 8, 2022Updated 3 years ago
- exploiting and defending neural networks(神经网络攻防专栏)☆15Mar 2, 2021Updated 5 years ago
- ☆15Jul 5, 2019Updated 6 years ago
- AppXSvc Arbitrary File Security Descriptor Overwrite EoP☆20Sep 15, 2019Updated 6 years ago
- 可能有一些你没见过的端口扫描脚本☆12Nov 28, 2018Updated 7 years ago
- ☆16Nov 10, 2018Updated 7 years ago
- A C# tool to send emails through Outlook from the command line or in memory☆32Jun 17, 2020Updated 5 years ago
- ☆16Feb 26, 2018Updated 8 years ago
- Beer-ISAC Community Resources☆26Jan 22, 2021Updated 5 years ago
- 一个对常见的web日志进行解析处理的粗糙DEMO☆21Jun 3, 2018Updated 7 years ago
- Inject Frida-Gadget into a local process☆26Jul 5, 2019Updated 6 years ago
- A BACnet layer for Scapy☆13Nov 25, 2015Updated 10 years ago
- CVE-2018-3191 反弹shell☆16Oct 23, 2018Updated 7 years ago
- Inject .Net payloads into other .Net assemblies on disk☆61Dec 12, 2019Updated 6 years ago
- PowerShell based Active Directory Honey User Account Management with Universal Dashboards☆140Jun 26, 2019Updated 6 years ago
- OpenVPN Connect for Windows (MSI) - 3.1.0.361 - Privilege Escalation☆26Feb 28, 2020Updated 6 years ago
- Metasploit Modules for OPC UA☆35Apr 2, 2020Updated 5 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Dec 1, 2018Updated 7 years ago
- Abusing SketchUp to make persistence on Windows☆21Mar 26, 2019Updated 6 years ago
- Understanding industrial Cybersecurity.☆52Updated this week
- An example rootkit that gives a userland process root permissions☆78Oct 17, 2019Updated 6 years ago
- (Wordpress) Ninja Forms File Uploads Extension <= 3.0.22 – Unauthenticated Arbitrary File Upload☆17May 17, 2019Updated 6 years ago
- APOLOGEE is a Python script and Metasploit module that enumerates a hidden directory on Siemens APOGEE PXC BACnet Automation Controllers …☆50May 22, 2025Updated 10 months ago
- PoC for a kernel rootkit☆10Feb 20, 2020Updated 6 years ago