Skip to content

Exfiltrate blind remote code execution output over DNS via Burp Collaborator.

License

Notifications You must be signed in to change notification settings

Green-m/Collabfiltrator

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

24 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Collabfiltrator

Exfiltrate blind remote code execution output over DNS via Burp Collaborator.

Authors:

Requirements:

jython install dnslib

java -jar jython.jar -m pip install dnslib

Support:

Installation in Burp Suite Professional

Blog Post

Currently Supported Platforms:

  • Windows
  • Linux

Usage:

Select a platform from the dropdown menu, enter the desired command, and press Execute. A payload will be generated for the platform you choose. Select Copy Payload to Clipboard, run the generated payload on your target, and wait for results to appear in the output window

For debug

If you liked this plugin, please consider donating:

BTC: 1GvMN6AAQ9WgGZpAX4SFVTi2xU7LgCXAh2
ETH: 0x847487DBcC6eC9b681a736BE763aca3cB8Debe49
Paypal: paypal.me/logueadam

About

Exfiltrate blind remote code execution output over DNS via Burp Collaborator.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 100.0%