ricardojoserf / DoubleTeamView external linksLinks
Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports
☆59Jul 13, 2025Updated 7 months ago
Alternatives and similar repositories for DoubleTeam
Users that are interested in DoubleTeam are comparing it to the libraries listed below
Sorting:
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆110Jul 21, 2025Updated 6 months ago
- Remap ntdll.dll using only NTAPI functions with a suspended process☆27Apr 13, 2025Updated 10 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40May 7, 2023Updated 2 years ago
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆54Jan 26, 2026Updated 2 weeks ago
- A tool to enumerate and download files from the System Center Configuration Manager (SCCM) SMB share (SCCMContentLib)☆16Jul 27, 2024Updated last year
- Find world writable directories that contain a .exe or .dll file☆13Aug 31, 2021Updated 4 years ago
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆96Apr 2, 2025Updated 10 months ago
- A simple rpc2socks alternative in pure Go.☆31Jul 8, 2024Updated last year
- Ebyte-Go-Morpher is a Go program that parses, analyzes, and rewrites Go source code to apply multiple layers of obfuscation. It operates …☆122Jul 19, 2025Updated 6 months ago
- Fast Windows post-exploitation wins after initial access.☆28Jan 28, 2026Updated 2 weeks ago
- Golang Automation Framework for Cobalt Strike using the Rest API☆56Dec 4, 2025Updated 2 months ago
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆109May 30, 2025Updated 8 months ago
- A python library to create BloodHound OpenGraphs☆52Feb 4, 2026Updated last week
- A lightweight PowerShell tool for assessing the security posture of Microsoft Entra ID environments. It helps identify privileged object…☆310Updated this week
- A Windows tool that converts LDIF files to BloodHound CE☆25Dec 20, 2025Updated last month
- Sh3ller is a lightweight C2 framework in its simplest form.☆31Sep 5, 2025Updated 5 months ago
- PoC for detecting and evading ETW detection of .Net Assembly.Load☆21Aug 26, 2020Updated 5 years ago
- PoC to self-delete a binary in C#☆35Feb 6, 2024Updated 2 years ago
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 6 months ago
- Addon for BHCE☆58Apr 1, 2025Updated 10 months ago
- Living Under the Land on Linux ~ Bsides Belfast/Vienna 2025☆37Nov 22, 2025Updated 2 months ago
- Repo hacks☆21Dec 7, 2025Updated 2 months ago
- Hunting and injecting RWX 'mockingjay' DLLs in pure nim☆59Dec 11, 2024Updated last year
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆92Jan 14, 2026Updated last month
- ☆50Jun 4, 2025Updated 8 months ago
- Bloodhound python Ingestor using ADWS☆28Feb 4, 2026Updated last week
- Blog/Journal on how to backdoor VSCode extensions☆76Updated this week
- Enumerate active EDR's on the system☆150Sep 23, 2025Updated 4 months ago
- Abuse trust-boundaries to bypass firewalls and network controls☆385Jul 24, 2025Updated 6 months ago
- Rust template/library for implementing your own COFF loader☆71Jan 27, 2025Updated last year
- Command-line tool for discovering SaaS platforms a company uses via DNS enumeration☆35Jul 23, 2025Updated 6 months ago
- AWS Testing and Reporting Management Tool☆20Jan 23, 2023Updated 3 years ago
- Random BOFs for LDAP tradecraft☆72Sep 9, 2025Updated 5 months ago
- ☆163Nov 19, 2025Updated 2 months ago
- ☆35Feb 5, 2026Updated last week
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆41Dec 8, 2023Updated 2 years ago
- Script to extract the cached credentials from SSSD, getting Active Directory credentials from Unix systems☆23Jun 14, 2023Updated 2 years ago
- ☆23Mar 4, 2025Updated 11 months ago