Skip to content
Exfiltrate blind remote code execution output over DNS via Burp Collaborator.
Python
Branch: master
Clone or download

Latest commit

Latest commit 5209ce2 Mar 17, 2020

Files

Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
Collabfiltrator.py Updated default command to dir C:\inetpub\wwwroot Mar 16, 2020
LICENSE Initial commit Mar 16, 2020
README.md Update README.md Mar 16, 2020

README.md

Collabfiltrator

Exfiltrate blind remote code execution output over DNS via Burp Collaborator.

Authors:

Requirements:

Support:

Installation in Burp Suite Professional

Blog Post

Currently Supported Platforms:

  • Windows
  • Linux

Usage:

Select a platform from the dropdown menu, enter the desired command, and press Execute. A payload will be generated for the platform you choose. Select Copy Payload to Clipboard, run the generated payload on your target, and wait for results to appear in the output window

If you liked this plugin, please consider donating:

BTC: 1GvMN6AAQ9WgGZpAX4SFVTi2xU7LgCXAh2
ETH: 0x847487DBcC6eC9b681a736BE763aca3cB8Debe49
Paypal: paypal.me/logueadam
You can’t perform that action at this time.