Phishing
Attackers can upload malicious files on uplooder and share the download link with target users.
Exfiltration
Attackers can upload data to uplooder and share the link to themselves to download the exfiltrated data.
Download
Attackers can keep their tools stored on uplooder and when required, use the direct download link to fetch the tools.
Created: 2022-03-27
Last Update: 2022-03-27
Credits: Andre Gironda - @AndreGironda