Cloakify  - Hide, Data Exfiltrating & Infiltration In Plain Sight.

Cloakify – Hide, Data Exfiltrating & Infiltration In Plain Sight.

CloakifyFactory is a menu-driven tool that leverages Cloakify Toolset scripts. When you choose to Cloakify a file, the scripts first Base64-encode the payload, then apply a cipher to generate a list of strings that encodes the Base64 payload. You then transfer the file however you wish to its desired destination. Once exfiltrated, choose Decloakify with the same cipher to decode the payload.

NOTE: Cloakify is not a secure encryption scheme. It’s vulnerable to frequency analysis attacks. Use the ‘Add Noise’ option to add entropy when cloaking a payload to help degrade frequency analysis attacks. Be sure to encrypt the file prior to cloaking if secrecy is needed.
The supporting scripts (cloakify.py and decloakify.py) can be use as standalone scripts. Very small, simple, clean, portable. For scenarios where infiltrating the full toolset is impractical, you can quickly type the standalone into a target’s local shell, generate a cipher in place, and cloakify -> exfiltrate.

cloakify

Use py2exe if Windows target lacks Python. (http://www.py2exe.org/)

Prepackaged ciphers include lists of:
+ Amphibians (scientific names)
+ Belgian Beers
+ Desserts in English, Arabic, Thai, Russian, Hindi, Chinese, Persian, and Muppet (Swedish Chef)
+ Emoji
+ evadeAV (smallest cipher space, x3 payload size)
+ GeoCoords World Capitals (Lat/Lon)
+ GeoCaching Coordinates (w/ Site Names)
+ IPv4 Addresses of Popular Websites
+ MD5 Password Hashes
+ PokemonGo Monsters
+ Ski Resorts
+ Status Codes (generic)
+ Star Trek characters
+ Top 100 Websites
+ World Beaches
+ World Cup Teams

Prepackaged scripts for adding noise / entropy to your cloaked payloads:
+ prependEmoji.py: Adds a randomize emoji to each line
+ prependID.py: Adds a randomized ID tag to each line
+ prependLatLonCoords.py: Adds randomized LatLong coordinates to each line
+ prependTimestamps.py: Adds timestamps (log file style) to each line

Create Your Own Cipers
Cloakify Factory is at its best when you’re using your own customized ciphers. The default ciphers may work for most needs, but in a unique exfiltration scenario you may need to build your own. At the very least, you can copy a prepackaged cipher and randomize the order.
Creating a Cipher:
– Generate a list of at least 66 unique words / phrases / symbols (Unicode accepted)
– Remove all duplicate entries and all blank lines
– Randomize the list order
– Place in the “ciphers/” subdirectory
– Re-run CloakifyFactory and it will automatically load your new cipher as an option
– Test cloaking / decloaking with new cipher before using operationally

Requirements:
+ Python 2.7.x

Usage:

Source: https://github.com/TryCatchHCF