Hide secrets with invisible characters in plain text securely using passwords 🧙🏻♂️⭐
-
Updated
Oct 15, 2023 - JavaScript
Hide secrets with invisible characters in plain text securely using passwords 🧙🏻♂️⭐
Upload arbitrary data via Apple's Find My network.
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
A Python Package for Data Exfiltration
PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems associated with typical DNS exfiltration methods. Transfer data between systems without the communicating devices directly connecting to each other or to a common endpoint. No need to control a DNS Name Server.
[Draft]Awesome Cyber Security Resource Collection. Currently contains 8000+ open source repositories, and not very well classified. For each repository, extra info included: star count, commit count, last update time. This is the DRAFT version.
Generates malicious LNK file payloads for data exfiltration
SecretPixel is a cutting-edge steganography tool designed to securely conceal sensitive information within images. It stands out in the realm of digital steganography by combining advanced encryption, compression, and a seeded Least Significant Bit (LSB) technique to provide a robust solution for embedding data undetectably.
Golang binary for data exfiltration with ICMP protocol (+ ICMP bindshell, http over ICMP tunneling, ...)
A prototype malware C2 channel using x509 certificates over mTLS
Drive-by data exfiltration using open WiFi networks & DNS requests
A Red Team tool for exfiltrating sensitive data from Confluence pages.
A Red Team tool for exfiltrating sensitive data from Jira tickets.
Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.
Python code to extract chrome cookie, history and login data files
Data exfiltration utility for testing detection capabilities
Red Team tool for exfiltrating files from a target's Google Drive that you have access to, via Google's API.
Data exfiltration and covert communication tool
SQLMap wrapper that lets you use Interact.sh as a DNS server for exfiltrating data with zero configuration
Transmissions over time based covert channels across a network. Modifies the time intervals between packets to transmit data.
Add a description, image, and links to the data-exfiltration topic page so that developers can more easily learn about it.
To associate your repository with the data-exfiltration topic, visit your repo's landing page and select "manage topics."