Nickguitar / GhostPipeLinks
Self-hosted tiny web C2 framework for dynamically managing PowerShell/BashScript payloads and collecting exfiltrated data
☆19Updated 8 months ago
Alternatives and similar repositories for GhostPipe
Users that are interested in GhostPipe are comparing it to the libraries listed below
Sorting:
- Autofill Phishing☆85Updated 4 months ago
- BLE cha0s t00lkit xox☆65Updated last month
- Evil Crow Cable Pro device☆132Updated 3 months ago
- Remake of CVE-2020-9484 by Pentestical☆23Updated last year
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆224Updated 2 years ago
- Turning smart lights into Wifi Hacking implants.☆177Updated 11 months ago
- WiFi Cha0s t00lkit☆68Updated 6 months ago
- Bookmarklet to find endpoints easily with one click☆74Updated last year
- A python script to check printer across the world that allow printing on port 9100 trough pjl☆14Updated last year
- Analyze your tryhackme progress!☆12Updated last year
- Simple HTTP listener for security testing☆19Updated 3 years ago
- What the name says....☆104Updated last year
- CTF toolbox☆21Updated 4 years ago
- Extracts faces from youtube videos☆16Updated 2 years ago
- This project is a server-side solution for seamless URL redirection when a QR code is scanned. It redirects users to a specified URL and …☆17Updated 5 months ago
- A wordlist for targeting netgear router default WPA2 passwords☆36Updated 2 years ago
- PDFs of awesome cybersecurity info☆22Updated this week
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆56Updated 4 years ago
- The easiest way to achieve a reverse shell bypassing Windows Defender. Windows Evasion | Windows Defender Evasion | Windows Defender Bypa…☆47Updated 2 months ago
- Testing POC for use cases☆24Updated last year
- A project repository to store documented experimentation on warwalking subject and look alikes, with affordable or popular hardware, code…☆20Updated last year
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆347Updated last year
- WPair is a defensive security research tool that demonstrates the CVE-2025-36911 (eg WhisperPair) vulnerability in Google's Fast Pair pro…☆162Updated this week
- A tool for automating WPA3-Transition Mode Downgrade Attack also known as Dragonblood Vulnerability☆55Updated last year
- A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse …☆118Updated last year
- Unlock Exclusive Insights! 🚀📖 Download My FREE E-Zine Now ➡️ Over 170 Pages of Essential Content! Elevate your hardware hacking game w…☆236Updated last year
- BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetoo…☆643Updated 4 months ago
- A PoC exploit for CVE-2024-25600 - WordPress Bricks Builder Remote Code Execution (RCE)☆51Updated last year
- WiFi Rubber Ducky with a web interface using CircuitPython☆120Updated 3 months ago
- A python script that look for hikvision vulnerable cams with a backdoor☆27Updated 2 years ago