Self-hosted tiny web C2 framework for dynamically managing PowerShell/BashScript payloads and collecting exfiltrated data
☆19May 9, 2025Updated 11 months ago
Alternatives and similar repositories for GhostPipe
Users that are interested in GhostPipe are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A python script that look for hikvision vulnerable cams with a backdoor☆28Nov 23, 2023Updated 2 years ago
- ESP32-S3 based USB-HID device with BadUSB capabilities to execute custom and user defined payloads☆49Sep 10, 2024Updated last year
- A Mersenne Twister Random Number Generator☆28Feb 2, 2024Updated 2 years ago
- huawei mac2wepkey scanner☆19Jun 6, 2013Updated 12 years ago
- 「🧊」Ring 3 Rootkit for Windows 10☆60Dec 7, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- WiFi-controlled keystroke injection tool using ESP32 and CH9329☆12Feb 27, 2025Updated last year
- ☆32Sep 10, 2025Updated 7 months ago
- Mycroft is a Offline File Analyzer and Metadata Scraper☆29Feb 21, 2026Updated last month
- C# implementation of Out-Minidump.ps1☆10Jul 13, 2018Updated 7 years ago
- Fixed esp32 ieee80211.a lib esp_wifi_80211_tx() function sanity check filter of deauth packets☆20Jul 5, 2023Updated 2 years ago
- Python Reverse Shell Builder with some advanced functionalities☆10Feb 16, 2021Updated 5 years ago
- Collection of Flipper Zero Files, 200+ links to other repos for all sorts of flipper zero needs including presets, Firmware, animations, …☆16Mar 31, 2025Updated last year
- 「⚔️」Ring 0 Rootkit for Linux Kernels x86/x86_64 5.x/6.x☆26Apr 10, 2025Updated last year
- Hacking around with CYD and BLE☆20Jan 22, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆18Sep 22, 2024Updated last year
- Simple script to bulk check if IPs match networks☆11Jan 11, 2022Updated 4 years ago
- collection of some script i use to make life easier☆27Dec 28, 2025Updated 3 months ago
- Telegram base free Rat☆13Apr 26, 2025Updated 11 months ago
- Heartbleed OpenSSL exploit☆14Apr 11, 2014Updated 12 years ago
- My experiments in weaponizing Nim (https://nim-lang.org/)☆17Mar 1, 2023Updated 3 years ago
- Gets currently logged-on users on domain computers, to see if they are local admins or not.☆10Aug 14, 2019Updated 6 years ago
- Digispark scripts☆15Feb 3, 2025Updated last year
- Kali nethunter pro for OnePlus 6/6T☆16May 28, 2025Updated 10 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A tool for the ESP32 with the ability to deauthenticate stations connected to WiFi networks☆23Dec 18, 2023Updated 2 years ago
- Robson is a simple LKM rootkit that uses the Linux kernel's kprobes tracing feature as a hooking mechanism.☆13Feb 16, 2023Updated 3 years ago
- Weaponize.it is your go-to resource for gaining insights into pentesting, bug bounty hunting, and scripting.☆12Apr 3, 2025Updated last year
- ☆17Sep 7, 2024Updated last year
- A proof of concept of the path traversal vulnerability in the python AioHTTP library =< 3.9.1☆20Mar 19, 2024Updated 2 years ago
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆18May 19, 2024Updated last year
- ☆17Feb 17, 2022Updated 4 years ago
- An x86_64 Linux decompiler written in Python!☆14Jan 16, 2019Updated 7 years ago
- Bubble.io security research: 0day / exploiting elasticsearch implementation / Research by: Lucca & Pedro☆79Apr 15, 2025Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- GiveWP PHP Object Injection exploit☆12Oct 1, 2024Updated last year
- A collections of methods to sleep on Windows using common and less-so-common techniques☆13Aug 16, 2024Updated last year
- Essa repositório armazena uma versão em markdown do OWASP WSTG para ser utilizada como uma referência rápida durante testes de invasão em…☆16Aug 11, 2023Updated 2 years ago
- The C3Mini-BlueJammer (MINI FORMFACTOR) (Bluetooth jammer, BLE jammer, WiFi jammer, RC jammer) disrupts 2.4GHz communications. It generat…☆89Oct 27, 2025Updated 5 months ago
- ☆56Nov 4, 2025Updated 5 months ago
- Wordpress 5.8.2 CVE-2022-21661 Vuln enviroment POC exploit☆14May 28, 2022Updated 3 years ago
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆45Dec 7, 2024Updated last year