Add TrevorC2, a masked C2 and data exfil tool using "legitimate" HTTP.

This commit is contained in:
Meitar M 2019-08-07 16:10:33 -04:00
parent c5b0f358a7
commit 559d7d9001
No known key found for this signature in database
GPG Key ID: 07EFAA28AB94BC85

View File

@ -330,6 +330,7 @@ See also [awesome-industrial-control-system-security](https://github.com/hslatma
* [Cloakify](https://github.com/TryCatchHCF/Cloakify) - Textual steganography toolkit that converts any filetype into lists of everyday strings.
* [DET](https://github.com/sensepost/DET) - Proof of concept to perform data exfiltration using either single or multiple channel(s) at the same time.
* [Iodine](https://code.kryo.se/iodine/) - Tunnel IPv4 data through a DNS server; useful for exfiltration from networks where Internet access is firewalled, but DNS queries are allowed.
* [TrevorC2](https://github.com/trustedsec/trevorc2) - Client/server tool for masking command and control and data exfiltration through a normally browsable website, not typical HTTP POST requests.
* [pwnat](https://github.com/samyk/pwnat) - Punches holes in firewalls and NATs.
* [tgcd](http://tgcd.sourceforge.net/) - Simple Unix network utility to extend the accessibility of TCP/IP based network services beyond firewalls.