Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.
-
Updated
Jun 16, 2024 - Python
8000
Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.
Drive-by data exfiltration using open WiFi networks & DNS requests
Open a DNS server that knows no records but records every request. Used for DNS exfiltration.
High-performance/Low-Latency FPGA-based DNS attack detector and threat mitigator
SQLMap wrapper that lets you use Interact.sh as a DNS server for exfiltrating data with zero configuration
Data exfiltration using DNS
🔠Warping your own Internet everywhere you go 📡
Dns Exfiltrator script, and evil Dns server side script
client & server that can be used to transfer data from a client to a DNS server using DNS only.
StealthNewSQL : The Ultimate NewSQL Injection Tool - Your All-in-One Solution for NewSQL Database Security! 🛡️ Uncover, exploit, and secure NewSQL database vulnerabilities with this feature-packed command-line tool. Whether you're a penetration tester, security researcher, or developer, StealthNewSQL equips you with the ultimate power! 💥
DNS-Ear listens to incoming DNS queries.
A DNS server used to receive files via DNS exfiltration
A covert reverse shell which uses DNS to tunnel its connections
Dynamic Time Warping for DNS Tunneling and Data Exfiltration
Deterministic DNS TXT tunnel detection. Composite anomaly scoring over PCAP and Zeek logs — every score is a decomposable function of six inspectable features. No ML. No black boxes. It computes. It explains.
A lightweight tool written in Go to monitor and detect potential DNS exfiltration attempts in real-time. Designed for network security analysis.
This repository documents a controlled research experiment that demonstrates how DNS lookups triggered by rendered content can be used to exfiltrate data. The technique leverages the browser's automatic DNS resolution behavior when rendering hostnames, without requiring HTTP requests or file upload
Validating DNS Exfiltration and Python Pickle RCE Attack Chains in AI Code Execution Sandboxes
Add a description, image, and links to the dns-exfiltration topic page so that developers can more easily learn about it.
To associate your repository with the dns-exfiltration topic, visit your repo's landing page and select "manage topics."