DET - (extensible) Data Exfiltration Toolkit adalah bukti konsep untuk melakukan Exfiltrasi Data menggunakan satu atau beberapa saluran sekaligus.
Ini adalah Bukti Konsep yang bertujuan untuk mengidentifikasi kemungkinan kegagalan DLP. Ini tidak boleh digunakan untuk mengeksploitasi data sensitif / live (katakanlah pada penilaian)
Idenya adalah membuat toolkit generik untuk menyambungkan protokol / layanan apa pun untuk menguji konfigurasi solusi Pemantauan Jaringan dan Pencegahan Kebocoran Data yang Tidak Terikat, terhadap teknik pengumpulan data yang berbeda.
Informasi labih lanjut : https://github.com/sensepost/DET
No More Yukinoshita 47. I'm Done
If You Found Every Social Media Platform Using "Yukinoshita 47" Name That's The Other Guy.
Copyright ©
Yukinoshita 47 | Published By Gooyaabi Templates
| Powered By Blogger
Design by WebSuccessAgency | Blogger Theme by NewBloggerThemes.com | BTheme.net
Design by WebSuccessAgency | Blogger Theme by NewBloggerThemes.com | BTheme.net
My Motivation
Blog Archive
-
►
2020
(27)
- ► Desember 2020 (2)
- ► November 2020 (2)
- ► September 2020 (9)
- ► Agustus 2020 (3)
- ► April 2020 (5)
-
►
2019
(111)
- ► September 2019 (1)
- ► Agustus 2019 (11)
- ► April 2019 (48)
- ► Maret 2019 (1)
- ► Februari 2019 (2)
-
►
2018
(150)
- ► Desember 2018 (20)
- ► November 2018 (7)
- ► Agustus 2018 (30)
-
▼
2017
(131)
- ► November 2017 (7)
-
▼
Oktober 2017
(32)
- CS Linux - Cyber Struggle Linux
- FUNtoolkit - tool kit for Pentest automated, simpl...
- FruityC2 post-exploitation framework based on the ...
- HS|OS BackBox Hackerschool Edition
- Evil Droid
- Modul Praktikum Pemrograman Android
- Modul Teori Pemrograman Android
- Pemrograman Android
- LeakManager - A tool to help you manage your leaks
- NETATTACK2 - advanced network scan and attack scri...
- Exploit Pack - Penetration testing framework
- Koadic C3 COM Command & Control - JScript RAT
- Mr.SIP - SIP-Based Audit and Attack Tool
- Reptile LKM Linux rootkit
- cyberprobe - Capturing, analysing and responding t...
- Python Gdork SQLi
- NXcrypt - 'python backdoor' framework
- WMD (Weapon of Mass Destruction) - Python framewor...
- Seccubus - Easy automated vulnerability scanning, ...
- Habu: Network Hacking Toolkit
- Breacher - A script to find admin login pages and ...
- Cameradar - CCTV Hacking tools
- CyberScan
- DET - (extensible) Data Exfiltration Toolkit
- Anti Ddos Bash Script
- fsociety Hacking Tools Pack – A Penetration Testin...
- CVE-2017-13082 : KRACK - Key Reinstallation Attack
- Cara Mudah Install Hacking Tools via Gnuroot Debia...
- Kali Linux : Menjalankan Libre Office Di Mozilla F...
- Megumi-san Bad USB : Install Payload Notepad Hijac...
- Setting Bad USB Untuk Tahap Persiapan Dalam Pembua...
- Bluebox-ng : Pentesting framework using Node.js po...
- ► September 2017 (31)
- ► Agustus 2017 (44)
- ► Maret 2017 (2)
- ► Februari 2017 (2)
- ► Januari 2017 (5)
-
►
2016
(11)
- ► Desember 2016 (11)
Categories
- Agama (1)
- Andrax (1)
- Android (36)
- Antivirus (5)
- Backup And Restore (2)
- Bad USB (2)
- Binary Exploitation (1)
- Blog (9)
- Botnet (1)
- Bug Hunting (7)
- Corporate Management (1)
- Cryptocurrency (2)
- Cryptography (8)
- CTF (27)
- Ddos (2)
- Deface (4)
- Digital Forensic (6)
- Digital Forensic Tools (13)
- Distro Linux (1)
- Ebook (6)
- Encryption Tools (6)
- Exploit - Poc Cheatsheet (5)
- Facebook Hacking Art (1)
- Getting Money (3)
- Hacking (76)
- Hacking Lab (4)
- Hacking Tools (154)
- Hardware (4)
- Hardware Tools (6)
- Hijacking (1)
- HTML CSS (3)
- Hukum (1)
- Indonesian Government & Law Enforcement (7)
- Information Gathering (13)
- IOS (1)
- Java (2)
- Javascript (1)
- Kali Linux Tutorial (30)
- Legalitas (1)
- Linux (32)
- Malware Analysis (1)
- Malware Tools (14)
- Messaging (1)
- Modul Pelajaran Kejuruan IT (2)
- Multiboot (1)
- National Security Agency (NSA) (15)
- Nethunter (2)
- Networking (2)
- Networking Tools (2)
- OSINT (2)
- Other (1)
- Parrot Linux (21)
- Password (4)
- Pemrograman Aplikasi (9)
- Pemrograman Web (13)
- PHP (3)
- Portal Belajar Otodidak (7)
- Produktivitas (2)
- Python (1)
- Report (3)
- Reverse Engineering (9)
- Reverse Engineering Tools (3)
- RFID (2)
- Risk Management (3)
- Sandbox (1)
- Security (19)
- Security Audit (4)
- Security Tools (21)
- Shell (1)
- Sistem Informasi (1)
- Sniffing (1)
- Social Engineering (1)
- Spotify (1)
- Termux (6)
- Tips and Trik (18)
- Tools (30)
- Troubleshooting (12)
- Tutorial (17)
- USB Rubber Ducky (2)
- VM (1)
- Vulnerability Analysis (10)
- Vulnerability Disclosure (3)
- Webserver (6)
- Wi-Fi (1)
- Windows (13)
- Windows Subsystem Linux (6)