From Cyber Security News – DNS Tunnel Keylogger – An Offensive Post-Exploitation Tool For Pentesters

[[{“value”:”A new keylogging server and client tool have been released on GitHub for pentesters. The tool utilizes DNS tunneling to transmit keystrokes through firewalls, potentially evading detection covertly. The tool, DNS-Tunnel-Keylogger, was designed for post-exploitation activities for pentesters and emphasizes lightweight exfiltration and persistence to minimize the chances of being discovered by security systems. The
The post DNS Tunnel Keylogger – An Offensive Post-Exploitation Tool For Pentesters appeared first on Cyber Security News.”}]] Read More  

Comments

No comments yet. Why don’t you start the discussion?

Leave a Reply

Your email address will not be published. Required fields are marked *