Exfiltrate

GC2 – Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet and exfiltrate data using Google Drive

GC2 (Google Command and Control) is a Command and Control application that allows an attacker to execute commands on the… Read More

3 years ago

GC2 – A Command And Control Application That Allows An Attacker To Execute Commands On The Target Machine Using Google Sheet And Exfiltrate Data Using Google Drive

GC2 (Google Command and Control) is a Command and Control application that allows an attacker to execute commands on the… Read More

3 years ago

Http-Protocol-Exfil – Exfiltrate Files Using The HTTP Protocol Version ("HTTP/1.0" Is A 0 And "HTTP/1.1" Is A 1)

Use the HTTP protocol version to send a file bit by bit ("HTTP/1.0" is a 0 and "HTTP/1.1" is a… Read More

3 years ago

CredPhish – A PowerShell Script Designed To Invoke Legitimate Credential Prompts And Exfiltrate Passwords Over DNS

CredPhish is a PowerShell script designed to invoke credential prompts and exfiltrate passwords. It relies on CredentialPicker to collect user… Read More

3 years ago

Browsertunnel – Surreptitiously exfiltrate data from the browser over DNS

Browsertunnel is a resource for exfiltrating info from the browser using the DNS protocol. It achieves this by abusing  dns-prefetch,… Read More

4 years ago

New Web-Based Credit Card Stealer Uses Telegram Messenger to Exfiltrate Data

Cybercriminal groups are constantly evolving to find new means to pilfer monetary info, and the hottest trick in their arsenal… Read More

4 years ago