GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
-
Updated
May 23, 2024 - HTML
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
Awesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.
This repo contains my own Ducky/BadUSB scripts, related PowerShell scripts and other Flipper Zero related stuff.
A simple way to exfiltrate data using spotify API
Offline command line tool that searches for GTFOBins binaries that can be used to bypass local security restrictions in misconfigured systems.
Transfer your file from an air-gapped device to another, using only qrcode, no wifi/usb/bluetooth needed.
badUSB workshop for beginners in cybersecurity
advanced Telegram x Discord C2, great for Data Exfitration and Network evasion 🔷
The Serverless Blind XSS App
Simple Windows and Linux keystroke injection tool that exfiltrates stored WiFi data (SSID and password).
Transmits AM radio on computers without radio transmitting hardware.
DriveFS Sleuth is a Python tool that automates investigating Google Drive File Stream disk artifacts, the tool has been developed based on research that has been performed by mounting different scenarios and noting down the changes in the Google Drive File Stream disk artifacts.
Exfiltration based on custom X509 certificates
Allows invisible watermarking of text and invisible encrypted messages. Uses 17 different invisible characters as HEX + delimiter. Includes encoder, decoder, spammer and other tools.
Minimalist C2 server for educational purpose.
Automagically decode DNS Exfiltration queries to convert Blind RCE into proper RCE via Burp Collaborator
A HTTP server for receiving exfiled data.
A DNS listener for receiving exfiltrated data via DNS queries.
A Ruby CLI utility for receiving exfiltrated data.
Dump files via Directory Traversal, LFI, Arbitrary File Read in a breeze with the help of ffuf
Add a description, image, and links to the exfiltration topic page so that developers can more easily learn about it.
To associate your repository with the exfiltration topic, visit your repo's landing page and select "manage topics."