Exfiltration modules allow you to discover various techniques that can be used to exfiltrate sensitive data from within the organization to external C2’s. Discover which services, ports and protcols can bypass your DLP solutions.

Exfiltration Modules

Exfiltration occurs when attackers have access to sensitive data and they need to transfer it out to their servers. ATTACKIFY has different modules designed to exfiltrate test data over a number of different channels and methods.

Some of these modules include:

  • DNS Exfiltration
  • HIPAA Data
  • PCI Data
  • Custom Data Encodings
  • DNS over HTTPS

No actual organization data is exfiltrated from endpoints, only test data generated by ATTACKIFY.

Dashboards provide users with a complete overview of how data is exfiltrated from the organization and over which protocols and from which environments. These modules would mostly be used to test Data Loss Prevention and networking monitoring solutions.

Related Modules


These modules are based off individual APT tactics, techniques and procedures to assist security teams in identifying suspicious activity usually seen in advanced persistent attackers.

more info

Security Controls

Validate endpoint security controls and perform a number of compliance checks to ensure systems are securely configured.

more info


Attackers are always finding new methods to bypass execution prevention controls allowing them to execute code or commands without alerting or generating logs.

more info