Home
Pronunciation: exfiltrate or exfil-treat
IPA: /ˈɛksfɪltɹeɪt/ or /ˈɛksfɪltɹit/
This is just one thing of many things that was missing from the Internet. If you got tired of trying several tunnelling tools for each protocols, this must be your tool^W framework.
If you want:
- to get unrestricted Internet access from a restricted network
- to exfiltrate data over a noisy side channel
- to use a custom protocol to tunnel data
- etc.
Then this could be your ultimate tool.
The tool is a proof of concept, Python 2.7, ugly code etc. If this upsets you, please move along do not waste your time on this.
It is not yet production grade, edge cases (and not that edge cases) are might not handled very well. There can be vulnerabilities in the code that has not been fixed. In case you manage to identify any, please contact me in private or create an issue on the Github page.
At the moment it supports the following operating systems:
- Linux
- MacOS(X)
Windows support is on the way.
You can help in a few ways by doing one of the following things:
- Join the development and take some responsibilities in the project
- Help spreading the word about the tool. Better coverage could help on development as well
- Donate some crypto currencies to the following addresses:
-
Bitcoin:
1JKBkCEexmNH9qptHCYJNZqa9ki9W78T5r
-
Litecoin:
LYJLvmuSdTq6jMkkGK18hPscTRnXxQraGd
-
Ethereum:
0x8fd9Bc3A9c64229aD479eDB29B4097Dd15F61059
-
Dash:
XpMeFGu4Lo6ddzmzmfxirh5jXfXG3ojTvy
-
Bitcoin:
XFLTReaT 2017-2020 Balazs Bucsay @xoreipeip
- Home - Introduction to XFLTReaT
- The framework - The framework explained
- Installation - How to install the tool
- Configuration - How to configure the framework
- Operating System support - See the supported Operating Systems
- Transport modules - Explanation of the transport modules
- Authentication modules - Explanation of the authentication modules
- Encryption modules - Explanation of the encryption modules
- Use Cases - Examples use cases
- Development - How to develop for the framework