Transmits AM radio on computers without radio transmitting hardware.
C
Updated Jan 23, 2019
An Information Security Reference That Doesn't Suck
Python
Updated Apr 10, 2019
Curated list of Unix binaries that can be exploited to bypass system security restrictions
HTML
Updated Apr 16, 2019
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings…
Python
Updated Dec 31, 2018
PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoi…
Python
Updated Dec 19, 2018
The Serverless Blind XSS App
JavaScript
Updated Feb 26, 2019
Ultrasonic networking - Transmitting TCP/IP via Ultrasound
Python
Updated May 30, 2017
Transfer files from Air gapped machines using QR codes
Python
Updated Oct 10, 2016
Play audio files (.wav) via the system bus
C
Updated May 30, 2017
File transfer via DNS
Python
Updated May 21, 2017
CSIRT is an awesome curated list of links and resources in security and csirt daily activities.
C
Updated Mar 25, 2019
Transmissions over time based covert channels across a network
C
Updated Jan 24, 2018
CDitter – Electromechanical based data exfiltration
Python
Updated May 30, 2017
mem'ry, tar pipe curl
JavaScript
Updated Dec 8, 2018
Cisco Implant Raspberry Controlled Operations
Python
Updated Apr 7, 2019
Minimal forensic/exfiltration/evil-maid/rescue live boot system
Shell
Updated Aug 11, 2018
Latch Data Exfiltration
Python
Updated Sep 26, 2017
Leaking (a lot of) Data from Air-Gapped Computers via the (small) Hard Drive LED
Python
Updated Feb 22, 2017
Covert data exfiltration and detection using 802.11 beacon stuffing
Python
Updated Apr 26, 2019
A module with exfiltration tools based in Latch
Python
Updated Feb 8, 2018
Curated list of Unix binaries that can be exploited to bypass system security restrictions
C# script to demonstrate dns exfiltration
C#
Updated May 11, 2017
get things from one computer to another, safely
The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list…
WarBerryPi - Tactical Exploitation
A PowerShell script for helping to find vulnerable settings in AD Group Policy.
SQL blind data extraction POC
Python
Updated Jan 15, 2016
Enumerate and exfiltrate files via out of band XXE, for situations where resolved entity is not displayed in the resp…
JavaScript
Updated Apr 4, 2018
A simple way to exfiltrate data using spotify API
Python
Updated Apr 30, 2019