Red team
-
Updated
Dec 13, 2025 - CSS
Red team
Owly is a powerful password generation tool designed to create secure and diverse password lists for various purposes, including security audits, penetration testing, and password recovery. It combines Leetspeak transformations, common password patterns, and user input variations to generate up to 50,000 unique password combinations.
Hunk is a small toolkit for exfiltrating files over multiple transports intended for red-team testing, research, and learning about covert data transfer techniques.
Awesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.
Transfer your file from an air-gapped device to another, using only qrcode, no wifi/usb/bluetooth needed.
badUSB workshop for beginners in cybersecurity
Find what egress ports are allowed
Linux post exploitation tool for info gathering and exfiltration 🐧📡💀
Hiding images into DNS TXT records
Multi-purpose archive toolkit for creation, extraction, exfiltration, and repair
UnixCollector is a simple and lightweight CLI tool designed for rapid collection, and optional exfiltration of sensitive information from Linux systems.
GraveDigger will search a linux system for files of interest, then compress and encrypt said files for exfiltration.
🥷 Prevent CSV injection and data exfiltration
CSharp Tooling for HIDX StealthLink
A tiny flask app for helping red-teamers, purple teamers, and pentesters in delivery, data exfiltration, and some attacks (SSRF, XXE, XSS, Session Hijacking, Session Riding).
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
A Vulnerability testing Python Builder script that makes the scanner and then sends collected data to a discord webhook.
Data exfiltration for an assume breach scenario via Web Bluetooth / BLE / Bluetooth Low Energy
Testing platform for covert data exfiltration techniques where sensitive documents are embedded into vector representations and tunneled out under the guise of legitimate RAG operations — bypassing traditional security controls and evading detection through semantic obfuscation.
Search for Unix binaries that can be exploited to bypass system security restrictions.
Add a description, image, and links to the exfiltration topic page so that developers can more easily learn about it.
To associate your repository with the exfiltration topic, visit your repo's landing page and select "manage topics."