Nickguitar / GhostPipeLinks
Self-hosted tiny web C2 framework for dynamically managing PowerShell/BashScript payloads and collecting exfiltrated data
☆17Updated 3 months ago
Alternatives and similar repositories for GhostPipe
Users that are interested in GhostPipe are comparing it to the libraries listed below
Sorting:
- Autofill Phishing☆75Updated last week
- Turning smart lights into Wifi Hacking implants.☆128Updated 6 months ago
- Remake of CVE-2020-9484 by Pentestical☆19Updated 11 months ago
- Bookmarklet to find endpoints easily with one click☆62Updated last year
- A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse …☆112Updated last year
- Evil Crow Cable Pro device☆118Updated 4 months ago
- This project is a server-side solution for seamless URL redirection when a QR code is scanned. It redirects users to a specified URL and …☆15Updated 2 weeks ago
- What the name says....☆101Updated 11 months ago
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆218Updated 2 years ago
- RockYou2024 10 billion passwords leaked in the largest compilation of all time☆327Updated last year
- A python script to check printer across the world that allow printing on port 9100 trough pjl☆10Updated 8 months ago
- Phone: A Mobile Phone Forensic Framework ( Android )☆200Updated 5 months ago
- The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single…☆37Updated last year
- WiFi Cha0s t00lkit xox☆52Updated last month
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆311Updated last year
- BLE cha0s t00lkit xox☆42Updated 3 months ago
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆273Updated last year
- A PoC exploit for CVE-2024-25600 - WordPress Bricks Builder Remote Code Execution (RCE)☆45Updated last year
- A python script that look for hikvision vulnerable cams with a backdoor☆23Updated last year
- Analyze your tryhackme progress!☆12Updated last year
- A framework to kickstart yourself in making malicious USB devices using ATTiny85.☆12Updated 2 months ago
- Demonized Shell is an Advanced Tool for persistence in linux.☆402Updated 7 months ago
- ☆20Updated last year
- Simple HTTP listener for security testing☆16Updated 2 years ago
- track, trace, and take down with SCAMTRACK☆22Updated this week
- CTF toolbox☆18Updated 4 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆51Updated 4 years ago
- Scripts for offensive security☆153Updated 3 months ago
- CTF Helper is a powerful, modular Command Line Interface (CLI) tool designed for Capture The Flag (CTF) competitions and cybersecurity ta…☆33Updated 2 months ago
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆175Updated last year