C2 infrastructure that allows Red Teamers to execute system commands on compromised hosts through Microsoft Teams.
-
Updated
Nov 27, 2024 - Go
C2 infrastructure that allows Red Teamers to execute system commands on compromised hosts through Microsoft Teams.
Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube
Discord C2 for Redteam....Need a better name
👋 Stealthy data exfiltration via IPv6 covert channel
A free online class on network information hiding/steganography/covert channels.
Youtube as C2 channel - Control Windows systems uploading QR videos to Youtube
Google Drive, OneDrive and Youtube as covert-channels - Control systems remotely by uploading files to Google Drive, OneDrive, Youtube or Telegram
A python socks server for tunneling a connection over another channel
Side-channel file transfer between independent VMs or processes executed on the same physical host.
Hands on with side-channels: a tutorial on covert-channels built using shared CPU resources. Three different covert-channel implementations based on Flush+Reload and Prime+Probe (L1, LLC) side-channels. Also, some tools and libraries.
Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10
A PoC on passing data through UNIX file privilege bits (RWX Triplets)
A truly private covert channel over the Telegram
Transmissions over time based covert channels across a network. Modifies the time intervals between packets to transmit data.
Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engagements using DNS tunneling.
Setup a AES Encrypted communication Between two machines Right from terminal
Some network covert channel projects of my own research, containing a protocol channel tool (protocol switching covert channel, PCT/PSCC), a protocol hopping covert channel (PHCC) tool, the protocol channel-aware active warden (PCAW) and ... VSTT.
Methodology that leverages FPV to automatically discover covert channels in hardware that is time-shared between processes. AutoCC operates at RTL to exhaustively examine any machine state left by a process after a context switch that creates an execution difference.
Exfiltrate data from a compromised target using covert channels
Covert Communication using LSB Based Image Steganography in the frequency domain using the DCT transform.
Add a description, image, and links to the covert-channel topic page so that developers can more easily learn about it.
To associate your repository with the covert-channel topic, visit your repo's landing page and select "manage topics."