InAardvark InfinitybyAardvark InfinityCrocodileDescription: A robust Bash script for file exfiltration and data extraction from compromised systems. Crocodile automates the process of…Sep 29
Hossam EhabEvading Detection and Stealthy Data Exfiltration with DNS over HTTPS (DoH)IntroductionJun 27
InAardvark InfinitybyAardvark InfinityFalconDescription: A sophisticated Bash script designed for high-speed network reconnaissance and data exfiltration. It automates the process of…Sep 28Sep 28
Roberto T.Different ways to transfer files from/to Linux (and Windows) machines (II)We will continue with the last post about “ Different ways to transfer files from/to Linux (and Windows) machines (I)”. Please, if you have…Sep 28, 20231Sep 28, 20231
InAardvark InfinitybyAardvark InfinityRavenDescription: A sophisticated Rust script for covert data exfiltration and command-and-control (C2) communication. Raven encrypts and…Sep 28Sep 28
InAardvark InfinitybyAardvark InfinityCrocodileDescription: A robust Bash script for file exfiltration and data extraction from compromised systems. Crocodile automates the process of…Sep 29
Hossam EhabEvading Detection and Stealthy Data Exfiltration with DNS over HTTPS (DoH)IntroductionJun 27
InAardvark InfinitybyAardvark InfinityFalconDescription: A sophisticated Bash script designed for high-speed network reconnaissance and data exfiltration. It automates the process of…Sep 28
Roberto T.Different ways to transfer files from/to Linux (and Windows) machines (II)We will continue with the last post about “ Different ways to transfer files from/to Linux (and Windows) machines (I)”. Please, if you have…Sep 28, 20231
InAardvark InfinitybyAardvark InfinityRavenDescription: A sophisticated Rust script for covert data exfiltration and command-and-control (C2) communication. Raven encrypts and…Sep 28
InLearning CyberSecuritybyAngel MercadoHTTP/DNS/Encrypted data exfiltration techniquesTable of ContentsJun 12
SecurityAuraData Exfiltration: Questions and How to Answer ThemAn Incident Responder insights and stories on how to approach data exfiltrationSep 15
Veselin MarkovPublic DNS Data bouncing exfiltration and DetectionIt is possible to use Adobe, Apple, Google or even Microsoft websites to exfiltrate data from a compromised system. The method is called…Oct 271