Drive Badger: open source platform for covert data exfiltration operations, ranging from small computers to big servers.

contact@drivebadger.com

Pen drives and SSD drives

You will find the list of our recommended hardware here.

And here you will find the list of hardware, that we don't recommend for some particular reason.

Tested hardware

Drive Badger was tested on the following hardware:

Class Model CPU Comments
laptop Acer Aspire ES1-131 Pentium N3700
Acer Aspire One D270 Atom N2600 no LUKS support
Dell Inspiron 1545 Pentium T4400
Dell Latitude 5400 Core i7-8665U
Fujitsu LifeBook A512 Core i3-3110M
HP Compaq 8510p Core 2 Duo T7700 boots only 32-bit Kali Linux
HP 14s-fq0xxx AMD Ryzen 7 4700U possible problem with Windows Home
Intel Classmate PC Atom N450
Lenovo V14-IIL Core i5-1035G1
Lenovo Z50-70 Core i5-4210U
MSI Apache Pro GE62 Core i7-6700HQ
MSI GF63 Thin 10SC Core i5-10300H
MSI Leopard GL75 10SCXR Core i7-10750H
MSI Omen GL75 9SC Core i7-9750H some USB ports not bootable
convertible Lenovo IdeaPad MIIX 300-10IBY Atom Z3735F
thin client Asus Eee Box B202 Atom N270 no LUKS support
Dell OptiPlex FX160 Atom 230 no LUKS support
Fit-PC2 by CompuLab Atom Z530 no LUKS support, other issues
HP ThinClient T510 VIA Eden X2
HP ThinClient T5740 Atom N280 firmware "T5000 series", no LUKS support
HP ThinClient T5740e Atom N280
desktop computer Dell OptiPlex 780 Core 2 Duo E8400
Dell OptiPlex 7010 Core i3-3220
Dell OptiPlex 7070 Core i7-9700
Dell OptiPlex 9010 Core i7-3770
Mac Mini A1347 Core i5-3210M
entry server HP Microserver G7 AMD Turion II Neo N54L weird LUKS behavior, DHCP problems
HP Microserver G8 Celeron G1610T
HP Microserver G10 AMD Opteron X3421 APU
HP Microserver G10+ Xeon E-2224
server Dell PowerEdge R710 Xeon E5504 LSI MegaRAID SAS 1078; no USB 3.0
HP ProLiant ML110 G7 Xeon E3 HP Smart Array P410 RAID
Supermicro X9SCL Xeon E3-1220 V2

Some of these hardware are our own equipment, others belong to our clients.

If you're looking for tested operating systems list, please see here.

From the founder...

Being in IT security business for almost 25 years, I realized, that breaking protections (or preventing it) is becoming less and less important. We are not living in Outlook Express times anymore...
The key point is the ability to keep the privileges permanent, once obtained. This becomes more and more difficult, as IT systems get more and more complicated - and this is exactly the goal of Drive Badger project: to give non-ITSEC people the ability to keep either the privileges, or the outcome of the successful break-in.