All Projects → ytisf → Pyexfil

ytisf / Pyexfil

Licence: mit
A Python Package for Data Exfiltration

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to Pyexfil

Solarthing
Monitors an Outback MATE and a Renogy Rover - MPPT Charge Controller. Integrates with Grafana, PVOutput and more!
Stars: ✭ 33 (-94.04%)
Mutual labels:  slack, packets
dfex
DNS File EXfiltration
Stars: ✭ 46 (-91.7%)
Mutual labels:  dns, post-exploitation
Vscode Deploy Reloaded
Recoded version of Visual Studio Code extension 'vs-deploy', which provides commands to deploy files to one or more destinations.
Stars: ✭ 129 (-76.71%)
Mutual labels:  slack, ftp
V3n0m Scanner
Popular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns
Stars: ✭ 847 (+52.89%)
Mutual labels:  dns, ftp
gost
GO Simple Tunnel - a simple tunnel written in golang
Stars: ✭ 8,395 (+1415.34%)
Mutual labels:  dns, quic
Downloads
AD Health Check, Send HTML Email, Ping machines, Encrypt Password,Bulk Password,Microsoft Teams,Monitor Certificate expiry, Monitor cert expiry, AD attributes, IP to Hostname, Export AD group, CSV to SQL,Shutdown, Restart, Local Admin, Disk Space, Account expiry,Restore Permissions, Backup permissions, Delete Files Older Than X-Days, export DHCP options,Read Registry,Distribution group AD attributes,Monitor Windows Services,Export Reverse DNS,Task Monitor,Monitor and alert, Exchange Health check,Get Network Info, Export AD Attributes,AD group members, Office 365 Group member, SQL to CSV, Outlook save send attachments, Upload files to FTP,Exchange – Total Messages Sent Received, Set Teams Only Mode, Intune Duplicate Device,Intune Cleanup Not Evaluated, Ownership and Grant Permissions, Write Create Modify Registry , Organization Hierarchy from AD,Azure AD Privileged Identity Management,Intune – Export MAM Devices,Intune Marking devices as Corporate, Dynamic to Static Distribution Group,Monitor Alert Office 365 services,Group Member Count,Bulk Addition external users sharepoint, ADD to Exchange online License Group,All in One Office 365 Powershell,Bulk Addition of Secondary Email, Automate move mailboxes to o365, Addition Modification Termination Exchange users, Monitoring Unified Messaging port,Unified Messaging Extensions Report, Set Default Quota for SharePoint,Bulk Contact Creation and Forwarding, Uploading and Downloading files sftp, Monitoring Sftp file and download, Office 365 groups Write back, CSV parser, Email address update, Email address modify, MDM enrollment, Welcome Email, Intune Welcome Email, remove messages, remove email, SKOB to AD, SKOB to group, PowerApps report, Powerautomate Report, Flow report, Server QA, Server Check List, O365 IP range, IP range Monitor, o365 Admin Roles, memberof extraction, CSV to Excel, Skype Policy, UPN Flip, Rooms Report, License Reconciliation,Intune Bulk Device Removal, Device Removal, Clear Activesync, Lync Account Termination,Lync Account Removal, Enable office 365 services, Enable o365 Services, Export PST, Site collection Report, Office 365 Group Sites, System Admin,ActiveSync Report,White Space,Active Directory attributes, outlook automation, Intune Detect App, Distribution list Fix, Legacy DN, start service, stop service, disable service, Message tracking, Distribution lists report,Distribution groups report,Quota Report, Auto reply, out of office, robocopy multi session, Home Folder, local admin, Database, UPN SIP Mismatch, Recoverable deleted, teams number, Number assignment, teams phone, AD Group Hierarchy, Hierarchy membership, Sync Groups
Stars: ✭ 75 (-86.46%)
Mutual labels:  dns, ftp
doq-proxy
DNS-over-QUIC to UDP Proxy
Stars: ✭ 57 (-89.71%)
Mutual labels:  dns, quic
Vscode Remote Workspace
Multi protocol support for handling remote files like local ones in Visual Studio Code.
Stars: ✭ 197 (-64.44%)
Mutual labels:  slack, ftp
SharpOffensiveShell
A sort of simple shell which support multiple protocols.
Stars: ✭ 71 (-87.18%)
Mutual labels:  dns, icmp
gost
GO Simple Tunnel - a simple tunnel written in golang
Stars: ✭ 154 (-72.2%)
Mutual labels:  dns, quic
Libnet
A portable framework for low-level network packet construction
Stars: ✭ 640 (+15.52%)
Mutual labels:  dns, bgp
Covertutils
A framework for Backdoor development!
Stars: ✭ 424 (-23.47%)
Mutual labels:  post-exploitation, steganography
Pypacker
📦 The fastest and simplest packet manipulation lib for Python
Stars: ✭ 216 (-61.01%)
Mutual labels:  bgp, packets
Passer
Passive service locator, a python sniffer that identifies servers, clients, names and much more
Stars: ✭ 144 (-74.01%)
Mutual labels:  dns, packets
Pentesting toolkit
🏴‍☠️ Tools for pentesting, CTFs & wargames. 🏴‍☠️
Stars: ✭ 1,268 (+128.88%)
Mutual labels:  post-exploitation, steganography
ebook
Third edition of the Computer Networking: Principles, Protocols and Practice ebook
Stars: ✭ 64 (-88.45%)
Mutual labels:  dns, bgp
Stegastamp
Invisible Hyperlinks in Physical Photographs
Stars: ✭ 306 (-44.77%)
Mutual labels:  qrcode, steganography
Node Libcurl
libcurl bindings for Node.js
Stars: ✭ 447 (-19.31%)
Mutual labels:  ftp, quic
Doggo
🐶 Command-line DNS Client for Humans. Written in Golang
Stars: ✭ 515 (-7.04%)
Mutual labels:  dns
Bastion
🔒Secure Bastion implemented as Docker Container running Alpine Linux with Google Authenticator & DUO MFA support
Stars: ✭ 531 (-4.15%)
Mutual labels:  slack

PyExfil

Stress Testing Detection & Creativity

Contributions Welcome HitCount PyPI download month PyPI license GitHub stars made-with-python

Logo

PyExfil was born as a PoC and kind of a playground and grew to be something a bit more. In my eyes it's still a messy PoC that needs a lot more work and testing to become stable. The purpose of PyExfil is to set as many exfiltration, and now also communication, techniques that CAN be used by various threat actors/malware around to bypass various detection and mitigation tools and techniques. You can track changes at the official GitHub page.

Putting it simply, it's meant to be used as a testing tool rather than an actual Red Teaming tool. Although most techniques and methods should be easily ported and compiled to various operating systems, some stable some experimental, the transmission mechanism should be stable on all techniques. Clone it, deploy on a node in your organization and see which systems can catch which techniques.

Getting Started

PIP

For using pip (not necessarily the most updated):

pip install --user PyExfil

Prerequisites

For source:

git clone https://www.github.com/ytisf/PyExfil
cd PyExfil
pip install --user -r requirements.txt

We recommend installing py2exe as well so that you may cross compile various modules to a binary for easier transportation. You can do that with:

pip install py2exe

Installing

Go to the same folder where PyExfil was cloned to and:

pip setup.py --user install

List of Techniques

For usage per modules have a look at the USAGE file.

Data Generation

Although this tool was initially created as a game and later on turned to be a Red Team oriented tool, at the end of a day a major usage of PyExfil is to test various DLP (Data Leakage Protection) systems as well as detection of intrusion. To make the latter mission simpler we have created a little module to generate fake data with a structure that matches both PII and PCI data sets. These are intended to trigger alerts while being broadcate outside of the network.

Here is how to use it:

from pyexfil.includes import CreateTestData

c = CreateTestData(rows=1000, output_location="/tmp/list.csv")
c.Run()

After this you can use which ever PyExfil module you would like to try and exfiltrate the data set created. This way you can test your detection without risking exfiltrating valuable data.

Contributions

We welcome it! From testing, to improving quality of code and up to entirely new methods.

Future Changes

Versioning

For details about version look at the tags on this repository.

Version 1.0.0!

  • [x] Surprise on restructure (Add Another).
  • [x] Split DOCUMENTATION.md and README.md to two different files.
  • [x] Get a nice logo.
  • [x] Uniform calling convention for newer modules.
  • [x] Exfiltration data-set generator (PII&PCI).

Version 1.3 - Harpax:

  • [x] Adding 4 new modules.
  • [x] General fixups.
  • [x] Some old modules recoded to fit new standard.
  • [x] Full compatibility between Python2 and Python3.

Version 1.4 - ?:

  • [ ] Expand physical exfiltration channels.
  • [ ] Re-test servers on older modules.
  • [ ] Add file manipulation class (for example, module zipception does not fit into any existing category although currently residing under Stega).

Hopefully - Close Future

  • [x] Attempt at creating a more uniform call convention. See DOCUMENTATION.md.
  • [ ] Fix that poorly written setup.py.
  • [ ] Backport all old modules to new calling convention.

In the Distant Future - The Year 2000

  • [ ] Add Golang/C++ support for portability.
  • [ ] Extensive testing for py2exe support.

Acknowledgments

People & Companies

  • Big shout out to JetBrains!!!
  • Thanks to barachy and AM for ideas on protocols to use.
  • Thanks to Itzik Kotler for some ideas.
  • Shout out to @cac0ns3c for resolving some dependency hell.
  • Thanks to @Nilesh0301 for pointing out some Python compatibility issues.
  • Big thanks to @hbmartin for pointing us to pytube3 latest update and support.

Resources

  • Thanks Wireshark for your awesome wiki and tool. Especially packet dumps.
  • Shout out to the nmap guys.
  • Thanks to Trey Hunner for the package names.
  • The Faker package.
  • Special thanks to Thomas Baruchel and Fredrik de Vibe for the txt2pdf package we used in the braille exfiltration package.
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].