A basic C# implementation of the ICMP exfiltration method.
-
Updated
Sep 11, 2023 - C#
A basic C# implementation of the ICMP exfiltration method.
C# Binary to convert input to lock key light sequence
C# bins to exfil data post-exfiltration.
Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10
transmit cs beacon (shellcode) over self-made dns to avoid anti-kill and AV
Add a description, image, and links to the exfiltration topic page so that developers can more easily learn about it.
To associate your repository with the exfiltration topic, visit your repo's landing page and select "manage topics."