A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files
☆127May 28, 2024Updated last year
Alternatives and similar repositories for DoubleDrive
Users that are interested in DoubleDrive are comparing it to the libraries listed below
Sorting:
- Watches the Downloads folder for any new files and inserts it into Nemesis for analysis.☆15Feb 29, 2024Updated 2 years ago
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆374Apr 6, 2024Updated last year
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆150May 3, 2024Updated last year
- A Red Team Activity Hub☆235Feb 12, 2026Updated 2 weeks ago
- Nemesis agent for Mythic☆28Dec 11, 2025Updated 2 months ago
- Canary Detection☆190Oct 20, 2025Updated 4 months ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆42Oct 29, 2024Updated last year
- Collection of self-made Red Team tools that have come in handy☆12Aug 25, 2024Updated last year
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆193Apr 14, 2024Updated last year
- TokenCert☆102Nov 15, 2024Updated last year
- A Slack bot phishing framework for Red Teaming exercises☆166Apr 27, 2024Updated last year
- ☆17Jan 9, 2025Updated last year
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆108Apr 18, 2024Updated last year
- ☆568Mar 28, 2024Updated last year
- A round-trip obfuscated HTTP file transfer setup built to bypass IDS detections.☆275May 10, 2024Updated last year
- ☆18Jun 25, 2024Updated last year
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆182Jun 9, 2024Updated last year
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Dec 16, 2023Updated 2 years ago
- psexecsvc - a python implementation of PSExec's native service implementation☆238Feb 11, 2025Updated last year
- BadZure automates the deployment of intentionally misconfigured Entra ID tenants and Azure subscriptions, populating them with diverse en…☆487Feb 23, 2026Updated last week
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆283Sep 18, 2024Updated last year
- Kibana app for RedELK☆18Mar 19, 2023Updated 2 years ago
- ☆100Sep 1, 2024Updated last year
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- Leak NTLM via Website tab in teams via MS Office☆78Mar 28, 2024Updated last year
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆42Oct 30, 2024Updated last year
- A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfve…☆592Jun 12, 2024Updated last year
- Automated Persistence and Lateral Movement using GCP Patch Management☆16Aug 11, 2022Updated 3 years ago
- ☆84May 19, 2024Updated last year
- A VSCode devcontainer for development of COFF files with batteries included.☆50Jul 10, 2023Updated 2 years ago
- RunPE adapted for x64 and written in C, does not use RWX☆28May 18, 2024Updated last year
- Decrypt Veeam database passwords☆222Dec 8, 2025Updated 2 months ago
- Azure DevOps Services Attack Toolkit☆313Mar 15, 2025Updated 11 months ago
- A C++ tool for process memory scanning & suspicious telemetry generation that attempts to detect a number of malicious techniques used by…☆86May 13, 2024Updated last year
- DEFCON 31 slide deck and video link☆67Jun 2, 2025Updated 9 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Oct 9, 2024Updated last year
- Modify managed functions from unmanaged code☆53Feb 1, 2024Updated 2 years ago
- ☆27Nov 7, 2023Updated 2 years ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆113Nov 13, 2024Updated last year