Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports
☆60Jul 13, 2025Updated 8 months ago
Alternatives and similar repositories for DoubleTeam
Users that are interested in DoubleTeam are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Remap ntdll.dll using only NTAPI functions with a suspended process☆28Apr 13, 2025Updated 11 months ago
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆110Jul 21, 2025Updated 8 months ago
- Repository to gather the BOF files I will be developing☆11Oct 1, 2024Updated last year
- PoC to self-delete a binary in C#☆36Feb 6, 2024Updated 2 years ago
- Manage Shadows Copies via the VSS API using C#, C++, Crystal or Python. Working on Windows 11☆84Jan 26, 2026Updated 2 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆24Oct 23, 2021Updated 4 years ago
- Script to extract the cached credentials from SSSD, getting Active Directory credentials from Unix systems☆24Jun 14, 2023Updated 2 years ago
- Ebyte-Go-Morpher is a Go program that parses, analyzes, and rewrites Go source code to apply multiple layers of obfuscation. It operates …☆123Jul 19, 2025Updated 8 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆41May 7, 2023Updated 2 years ago
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 8 months ago
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 3 months ago
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆54Jan 26, 2026Updated 2 months ago
- EMQX Dashboard Malicious Plugin leading to RCE☆47Jun 16, 2025Updated 9 months ago
- A tool to analyze Ntds.dit files once the NTLM and LM hashes have been cracked.☆15May 13, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Living Under the Land on Linux ~ Bsides Belfast/Vienna 2025☆38Nov 22, 2025Updated 4 months ago
- Golang Automation Framework for Cobalt Strike using the Rest API☆57Dec 4, 2025Updated 3 months ago
- Sh3ller is a lightweight C2 framework in its simplest form.☆31Sep 5, 2025Updated 6 months ago
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- ☆163Updated this week
- Repository to gather the .NET malware I will be developing☆18Mar 7, 2026Updated 2 weeks ago
- Fast Windows post-exploitation wins after initial access.☆29Jan 28, 2026Updated last month
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆45Apr 21, 2025Updated 11 months ago
- DEFCON 33 Workshop - Open Source Malware 101 - Everything you always wanted to know about npm malware (and more)☆15Aug 8, 2025Updated 7 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Enumerate active EDR's on the system☆152Sep 23, 2025Updated 6 months ago
- Blog/Journal on how to backdoor VSCode extensions☆80Feb 24, 2026Updated last month
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆42Feb 8, 2026Updated last month
- CVE-2025-59501 POC code☆25Nov 20, 2025Updated 4 months ago
- A lightweight PowerShell tool for assessing the security posture of Microsoft Entra ID environments. It helps identify privileged object…☆342Mar 16, 2026Updated last week
- BypassCredGuard CS BOF☆51Jan 23, 2025Updated last year
- Addon for BHCE☆58Apr 1, 2025Updated 11 months ago
- Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers☆18Mar 19, 2025Updated last year
- PoC for detecting and evading ETW detection of .Net Assembly.Load☆21Aug 26, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Impersonate Tokens using only NTAPI functions☆84Apr 4, 2025Updated 11 months ago
- A lightweight redirector for Google Cloud Run, enabling domain fronting via Google-owned infrastructure.☆135Nov 12, 2025Updated 4 months ago
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆96Apr 2, 2025Updated 11 months ago
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆111May 30, 2025Updated 9 months ago
- A simple rpc2socks alternative in pure Go.☆31Jul 8, 2024Updated last year
- ☆50Jun 4, 2025Updated 9 months ago
- Repo hacks☆21Dec 7, 2025Updated 3 months ago