-
Happy to see python in Excel :-)
I get a ProxyError when trying to make https requests using the requests library. Is this by design?
`import requests`
`URL = "https://www.geeksforgeeks.org/dat…
-
Hi again,
this is meant as a proposal for introducing an optional exfiltration conductance for the above mentioned boundary conditions. We often have the application case, that infiltration conductan…
-
```meta
Time: 2024-08-05 6:00PM Eastern
UTCTime: 2024-08-05 22:00 UTC
Duration: 2h
Location: ATL BitLab, 684 John Wesley Dobbs Ave NE, Unit A1, Atlanta, GA 30312
```
![security-night-2](https:…
-
**Is your feature request related to a problem? Please describe.**
We need a custom widget that will be used in a schema for Data Exfiltration payload. That widget should be a comma separated input f…
-
https://www.databreaches.net/four-more-attacks-on-the-healthcare-sector-weekend-edition/
"Regal Medical Group, Lakeside Medical Organization, ADOC Medical Group, and Greater Covina Medical (collect…
-
We should add the ability to capture the beaconing/callout/C2 Domains used by a malware instance, either as part of a Capability or a separate structure.
-
At least these:
- GPU power level
- GPU clock speed, other things
- GPU interconnect
- GPU model
It may be that some of these (power level) change often enough that sysinfo is not the right v…
-
Thank you for the excellent work. With Kali the dns server works fine for data exfiltration. But I would like to see a powershell implementation. In other words how can I use this to exfiltrate data o…
-
It will be good to add a similar script for windows
```
https://github.com/elastic/examples/blob/master/Machine%20Learning/Security%20analytics%20recipes/DNS_Data_Exfiltration/scripts/dns_exfil_r…
-
### Community Note
* Please vote on this issue by adding a 👍 [reaction](https://blog.github.com/2016-03-10-add-reactions-to-pull-requests-issues-and-comments/) to the original issue to help the…