Nickguitar / GhostPipeLinks
Self-hosted tiny web C2 framework for dynamically managing PowerShell/BashScript payloads and collecting exfiltrated data
☆19Updated 6 months ago
Alternatives and similar repositories for GhostPipe
Users that are interested in GhostPipe are comparing it to the libraries listed below
Sorting:
- Autofill Phishing☆80Updated 2 months ago
- Turning smart lights into Wifi Hacking implants.☆134Updated 8 months ago
- What the name says....☆101Updated last year
- Evil Crow Cable Pro device☆124Updated 3 weeks ago
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆222Updated 2 years ago
- Remake of CVE-2020-9484 by Pentestical☆22Updated last year
- Bookmarklet to find endpoints easily with one click☆68Updated last year
- BLE cha0s t00lkit xox☆54Updated 3 weeks ago
- WiFi Cha0s t00lkit xox☆67Updated 3 months ago
- ☆21Updated 2 years ago
- A python script to check printer across the world that allow printing on port 9100 trough pjl☆14Updated 10 months ago
- Analyze your tryhackme progress!☆12Updated last year
- CTF toolbox☆19Updated 4 years ago
- Simple HTTP listener for security testing☆18Updated 3 years ago
- DIY USB Rubber Ducky based on Arduino Micro☆169Updated last year
- This project is a server-side solution for seamless URL redirection when a QR code is scanned. It redirects users to a specified URL and …☆17Updated 2 months ago
- This is a fork code do https://github.com/n0xa/☆26Updated last month
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆54Updated 4 years ago
- track, trace, and take down with SCAMTRACK☆26Updated 2 months ago
- A project repository to store documented experimentation on warwalking subject and look alikes, with affordable or popular hardware, code…☆21Updated last year
- BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetoo…☆597Updated 2 months ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆337Updated last year
- The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single…☆38Updated last year
- A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse …☆114Updated last year
- WiFi Rubber Ducky with a web interface using CircuitPython☆106Updated 3 weeks ago
- Repository for Ducky payloads☆41Updated 2 weeks ago
- PDFs of awesome cybersecurity info☆19Updated 2 weeks ago
- A python script that look for hikvision vulnerable cams with a backdoor☆24Updated last year
- The easiest way to achieve a reverse shell bypassing Windows Defender. Windows Evasion | Windows Defender Evasion | Windows Defender Bypa…☆42Updated this week
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆393Updated 2 years ago