This Wiki is a part of Drive Badger project, a set of tools for stealth data exfiltration from:
- Windows - from XP to 11
- Linux
- Mac OS - at least up to Catalina
- Mobile devices (all brands and models that connect to the computer using USB, and support either MTP or PTP protocol for transferring data):
- Android phones, tablets and possibly other devices
- iOS-based devices (iPhone, iPad)
- Windows Phone 8/10 (Lumia phones)
- Symbian
- USB Mass Storage devices:
- mobile devices not supporting MTP/PTP
- mobile devices configured as mass storage (older phones, mp3 players etc.)
- external USB drives
- internal drives connected via USB bridge (eg. pulled from computers, where standard Drive Badger cannot be run, because all USB ports are damaged)
- including drives encrypted using Bitlocker, LUKS, VeraCrypt or APFS with Apple FileVault
This repository is intentionally empty and exists only as a namespace for corresponding Wiki. There are 4 Wikis overall:
- Drive Badger - main product Wiki
- Mobile Badger - secondary product, mobile version of Drive Badger
- field manuals - subjects beyond the product itself
- project Wiki - spanning all Wikis and translated projects dedicated for separate countries
And if you're just looking for the source code, go here.
This software was written and is meant to be used only by eligible entities, eg:
- police officers
- special agents
- intelligence officers
- military forces
- private investigators
- corporate red teams
- diplomats or other people with personal immunity
Its usage is always a subject to local legislation, and the user is solely responsible for all potential law infringements and/or misfeasances of duties.
Intention of this product, is not an incitement for a crime. Rather, Drive Badger is mainly intended to be used in countries, where using such tools is legal, or at most, can be a subject to possible disciplinary action between the end user and his/her employer.