DET (extensible) Data Exfiltration Toolkit Logo

DET (extensible) Data Exfiltration Toolkit

DET (extensible) Data Exfiltration Toolkit is a proof of concept tool for performing Data Exfiltration using multiple channels simultaneously.

163
Visit website
Compare
Compare
0
MCPThe entire cybersecurity market, one prompt awayTry MCP Access

DET (extensible) Data Exfiltration Toolkit Description

DET (is provided AS IS), is a proof of concept to perform Data Exfiltration using either single or multiple channel(s) at the same time. The idea was to create a generic toolkit to plug any kind of protocol/service to test implmented Network Monitoring and Data Leakage Prevention (DLP) solutions configuration, against different data exfiltration techniques. Slides DET has been presented at BSides Ljubljana on the 9th of March 2016 and the slides will be available here. Slides are available here. Example usage (ICMP plugin) Server-side: Client-side: Usage while combining two channels (Gmail/Twitter) Server-side: Client-side: Installation Clone the repo: git clone https://github.com/PaulSec/DET.git Then: pip install -r requirements.txt --user Configuration In order to use DET, you will need to configure it and add your proper settings (eg. SMTP/IMAP, AES256 encryption passphrase, proxies and so on). A configuration example file has been provided and is called: config-sample.json { "plugins": { "http": { "target": "192.168.0.12", "port": 8080, "proxies": ["192.168.0.13", "192.168.0.14"] }, "google_docs": { "target": "conchwaiter.uk.plak.cc"

DET (extensible) Data Exfiltration Toolkit FAQ

Common questions about DET (extensible) Data Exfiltration Toolkit including features, pricing, alternatives, and user reviews.

DET (extensible) Data Exfiltration Toolkit is DET (extensible) Data Exfiltration Toolkit is a proof of concept tool for performing Data Exfiltration using multiple channels simultaneously.. It is a Security Operations solution designed to help security teams with Proof Of Concept.

Have more questions? Browse our categories or search for specific tools.

ALTERNATIVES

InvisibilityCloak Logo

InvisibilityCloak is a proof-of-concept C# code obfuscation toolkit designed for red teaming and penetration testing to conceal post-exploitation tools from detection.

0
XlsGen Logo

A proof-of-concept tool that generates Excel BIFF8 files with embedded 4.0 macros programmatically without requiring Microsoft Excel installation.

0
Saruman v0.1 Logo

A proof-of-concept executable injection tool that compiles and launches parasitic executables within target processes using standard or stealth injection techniques.

0
Thinkst Canarytokens Detector and Diffuser/Nullifier Logo

A Python script that detects and removes Thinkst Canary Tokens from files using signature-based detection methods.

0
MagSpoof Logo

MagSpoof is a hardware device that emulates magnetic stripe cards using electromagnetic fields for security research and educational purposes.

0

Stay Updated with Mandos Brief

Get strategic cybersecurity insights in your inbox