Nickguitar / GhostPipeLinks
Self-hosted tiny web C2 framework for dynamically managing PowerShell/BashScript payloads and collecting exfiltrated data
☆19Updated 9 months ago
Alternatives and similar repositories for GhostPipe
Users that are interested in GhostPipe are comparing it to the libraries listed below
Sorting:
- Autofill Phishing☆85Updated 5 months ago
- Turning smart lights into Wifi Hacking implants.☆180Updated last year
- Bookmarklet to find endpoints easily with one click☆77Updated last year
- track, trace, and take down with SCAMTRACK☆29Updated 5 months ago
- BLE cha0s t00lkit xox☆69Updated last month
- Evil Crow Cable Pro device☆137Updated 3 months ago
- A Simple Discord Command and Control Client for Windows Machines using Powershell☆41Updated last month
- A python script to check printer across the world that allow printing on port 9100 trough pjl☆14Updated last year
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆225Updated 2 years ago
- This project is a server-side solution for seamless URL redirection when a QR code is scanned. It redirects users to a specified URL and …☆17Updated 5 months ago
- Remake of CVE-2020-9484 by Pentestical☆22Updated last year
- WiFi Cha0s t00lkit☆69Updated 6 months ago
- The easiest way to achieve a reverse shell bypassing Windows Defender. Windows Evasion | Windows Defender Evasion | Windows Defender Bypa…☆47Updated 3 months ago
- Simple HTTP listener for security testing☆19Updated 3 years ago
- What the name says....☆104Updated last year
- Analyze your tryhackme progress!☆12Updated last year
- ZeroTrace is a powerful ethical hacking tool for anonymization, routing all your system network traffic through the Tor network, making i…☆162Updated 2 months ago
- A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse …☆118Updated 2 years ago
- A Hardware USB keylogger and Bad-USB Device for $10 using the Pi Pico & Pi Pico-W!☆32Updated 5 months ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆349Updated last year
- Testing POC for use cases☆25Updated last year
- The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single…☆42Updated last year
- A framework to kickstart yourself in making malicious USB devices using ATTiny85.☆14Updated 8 months ago
- A simple script to automate systemd backdoor☆38Updated 3 years ago
- A PoC exploit for CVE-2024-25600 - WordPress Bricks Builder Remote Code Execution (RCE)☆51Updated last year
- WiFi Rubber Ducky with a web interface using CircuitPython☆125Updated 4 months ago
- WPair is a defensive security research tool that demonstrates the CVE-2025-36911 (eg WhisperPair) vulnerability in Google's Fast Pair pro…☆616Updated 3 weeks ago
- PDFs of awesome cybersecurity info☆24Updated 3 weeks ago
- CTF toolbox☆21Updated 4 years ago
- Living Off The Land (LOTL) persistent Reverse shell☆104Updated 2 years ago