SafeBreach-Labs / DoubleDriveLinks
A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files
☆124Updated last year
Alternatives and similar repositories for DoubleDrive
Users that are interested in DoubleDrive are comparing it to the libraries listed below
Sorting:
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated 8 months ago
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆140Updated 4 months ago
- A collection of tools, scripts and personal research☆131Updated 2 months ago
- Azure Post Exploitation Framework☆200Updated 3 months ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆102Updated last year
- Python3 utility for creating zip files that smuggle additional data for later extraction☆230Updated last month
- Retired TrustedSec Capabilities☆247Updated 6 months ago
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆80Updated 9 months ago
- An interactive shell to spoof some LOLBins command line☆184Updated last year
- ☆199Updated last week
- https://lolad-project.github.io/☆77Updated 5 months ago
- ☆91Updated last month
- Find potential DLL Sideloads on your windows computer☆208Updated 5 months ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆193Updated 2 months ago
- ☆104Updated last year
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆82Updated last year
- Ping-based Information Lookup and Outbound Transfer☆79Updated last year
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆105Updated 3 months ago
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆123Updated 4 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆172Updated last month
- Evade EDR's the simple way, by not touching any of the API's they hook.☆146Updated 4 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆124Updated last year
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆176Updated 9 months ago
- ☆220Updated last week
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.