πŸ“•
The Red Book
search
⌘Ctrlk
πŸ“•
The Red Book
  • πŸ“•The Red Book
  • 🦳Stages of Ethical Hacking
    • 1️⃣Information Gathering
    • 2️⃣Enumeration
    • 3️⃣Vulnerability Assessment
  • πŸ’ΎSystem/Host Based Attacks
    • πŸͺŸWindows
    • 🐧Linux
  • πŸ₯½Dorks
    • Google
    • Extra
  • 🎣Phishing
    • Gophish
    • evilgophish
    • King Phisher
    • EvilURL
  • πŸ”ŽOSINT
    • Temporary links
  • πŸ‘ΎData exfiltration
    • Temporary links
  • 🐝OWASP
    • Top10
  • πŸ“™Cheat Sheet
    • Curl
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
githubEdit
  1. πŸ‘ΎData exfiltration

Temporary links

LogoGitHub - Flangvik/SharpExfiltrate: Modular C# framework to exfiltrate loot over secure and trusted channels.GitHubchevron-right
LogoGitHub - Arno0x/DNSExfiltrator: Data exfiltration over DNS request covert channelGitHubchevron-right
LogoGitHub - RedSiege/Egress-Assess: Egress-Assess is a tool used to test egress data detection capabilitiesGitHubchevron-right
PreviousTemporary linkschevron-leftNextTop10chevron-right

Last updated 3 years ago