A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files
☆127May 28, 2024Updated last year
Alternatives and similar repositories for DoubleDrive
Users that are interested in DoubleDrive are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆374Apr 6, 2024Updated last year
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆108Apr 18, 2024Updated last year
- Watches the Downloads folder for any new files and inserts it into Nemesis for analysis.☆15Feb 29, 2024Updated 2 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆41Oct 29, 2024Updated last year
- A Red Team Activity Hub☆235Updated this week
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆151May 3, 2024Updated last year
- ☆17Jan 9, 2025Updated last year
- Collection of self-made Red Team tools that have come in handy☆12Aug 25, 2024Updated last year
- Canary Detection☆193Oct 20, 2025Updated 5 months ago
- Nemesis agent for Mythic☆28Dec 11, 2025Updated 3 months ago
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆193Apr 14, 2024Updated last year
- ☆81Apr 23, 2024Updated last year
- TokenCert☆102Nov 15, 2024Updated last year
- Kibana app for RedELK☆18Mar 19, 2023Updated 3 years ago
- ☆84May 19, 2024Updated last year
- ☆569Mar 28, 2024Updated last year
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆283Sep 18, 2024Updated last year
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆43Oct 30, 2024Updated last year
- A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfve…☆592Jun 12, 2024Updated last year
- A round-trip obfuscated HTTP file transfer setup built to bypass IDS detections.☆275May 10, 2024Updated last year
- Example code samples from our ScriptBlock Smuggling Blog post☆95Jun 18, 2024Updated last year
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Dec 16, 2023Updated 2 years ago
- A VSCode devcontainer for development of COFF files with batteries included.☆50Jul 10, 2023Updated 2 years ago
- Execute PowerShell code at the antimalware-light protection level.☆142Dec 13, 2022Updated 3 years ago
- psexecsvc - a python implementation of PSExec's native service implementation☆241Feb 11, 2025Updated last year
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Apr 15, 2024Updated last year
- ☆100Sep 1, 2024Updated last year
- A Slack bot phishing framework for Red Teaming exercises☆166Apr 27, 2024Updated last year
- Azure DevOps Services Attack Toolkit☆313Mar 15, 2025Updated last year
- Tools for analyzing EDR agents☆278Jun 10, 2024Updated last year
- Your Windows syscall hooking factory - feat Canterlot's Gate - All accessible over MCP☆127Updated this week
- EDRSandblast-GodFault☆271Aug 28, 2023Updated 2 years ago
- ☆123Oct 9, 2023Updated 2 years ago
- Claude MCP server to perform analysis on ROADrecon data☆49Mar 30, 2025Updated 11 months ago
- BadZure automates the deployment of intentionally misconfigured Entra ID tenants and Azure subscriptions, populating them with diverse en…☆506Mar 4, 2026Updated 2 weeks ago
- ☆18Jun 25, 2024Updated last year
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆674Dec 23, 2022Updated 3 years ago
- ☆234Jun 10, 2025Updated 9 months ago
- LuLu is the free macOS firewall☆12Jun 28, 2022Updated 3 years ago