CloakifyFactory transforms any file into a list of innocuous strings using text-based steganography to evade data loss prevention and security monitoring.
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
This tool is primarily used for covert data exfiltration and infiltration by converting files into harmless-looking text strings that bypass DLP, MLS devices, and signature-based detection. Security professionals, penetration testers, and red teamers use CloakifyFactory to stealthily transfer data across secure network boundaries without raising alerts.
CloakifyFactory is not a secure encryption tool and is vulnerable to frequency analysis; it is recommended to encrypt sensitive files prior to cloaking. The tool requires Python 2.7.x and may require py2exe packaging for Windows targets without Python installed. Its strength lies in evading detection by transforming data into innocuous text rather than providing cryptographic security.
Ensure Python 2.7.x is installed
Download or clone the repository from GitHub
Navigate to the directory containing cloakifyFactory.py
Run the tool using the command: python cloakifyFactory.py
python cloakifyFactory.py
Launches the menu-driven CloakifyFactory tool for cloaking and decloaking files
python cloakify.py -c <inputfile> -o <outputfile> -cipher <ciphername>
Standalone script to cloak (encode) a file using a specified cipher
python decloakify.py -c <inputfile> -o <outputfile> -cipher <ciphername>
Standalone script to decloak (decode) a previously cloaked file using the same cipher
Use 'Add Noise' option in CloakifyFactory
Adds entropy to the cloaked payload to help reduce vulnerability to frequency analysis