cheetz / pi_phone_homeView external linksLinks
Raspberry Pi 2 C2
☆15Feb 24, 2015Updated 10 years ago
Alternatives and similar repositories for pi_phone_home
Users that are interested in pi_phone_home are comparing it to the libraries listed below
Sorting:
- ☆15Apr 12, 2018Updated 7 years ago
- Nishang - PowerShell for penetration testing and offensive security.☆14May 4, 2015Updated 10 years ago
- initial push☆14Feb 10, 2015Updated 11 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆30Jul 8, 2016Updated 9 years ago
- PowerShell_Popup☆33Feb 10, 2015Updated 11 years ago
- ☆21Jun 24, 2018Updated 7 years ago
- Penetration Testing with Kali Linux☆22Oct 18, 2019Updated 6 years ago
- Reddit XSS Gather Tool☆20Apr 24, 2015Updated 10 years ago
- PowerShell Helper Tool☆150Mar 6, 2015Updated 10 years ago
- A red teaming attack paradigm against AI Agents☆32Mar 9, 2025Updated 11 months ago
- ☆10Feb 5, 2026Updated last week
- Converts the output from Invoke-Kerberoast into hashcat format.☆33Nov 13, 2018Updated 7 years ago
- Clean public password dump files and store in ELK☆37Jan 24, 2018Updated 8 years ago
- Searches for interesting cached DNS entries.☆55May 15, 2014Updated 11 years ago
- Repository containing machine solving attempts and results generated by BoxPwnr☆15Updated this week
- A HTTP bot in Java with basic commands and ability's☆10Aug 20, 2015Updated 10 years ago
- Open Data and sources for OSINT in Tajikistan☆13Jan 17, 2025Updated last year
- The Art of the Steal / Deal - Made in Austria - Collection of Token White Papers on the Blockchain - Incl. Scam Alert - Thanks for your m…☆10Jan 2, 2021Updated 5 years ago
- Fixes corrupted Magic Bytes for PNG, JPG and JPEG☆10Aug 4, 2021Updated 4 years ago
- The Eureka Lab Series is designed for learners at all levels of experience and interest in security concepts and technologies.☆10Nov 30, 2025Updated 2 months ago
- A Repository for Miscellaneous Scripts☆11Jul 18, 2014Updated 11 years ago
- Arduino project for controlling digital WWA LED strips to act as car DRL and sequential turn signals.☆12Apr 27, 2018Updated 7 years ago
- ☆11Dec 10, 2025Updated 2 months ago
- iSpy for iOS allows you to show UIView's size, cpu/memory/network information, and update any UIView's properties at runtime.☆11Mar 24, 2016Updated 9 years ago
- Python wrapper for gatttool from BlueZ to access Bluetooth LE Devices☆12Nov 13, 2015Updated 10 years ago
- Slack post-exploitation script for leaked bot tokens and "d" cookies☆16Nov 18, 2025Updated 2 months ago
- ☆13Feb 2, 2026Updated last week
- Docker Compose configuration for running n8n with PostgreSQL☆10Apr 13, 2025Updated 10 months ago
- Content from THOTCON 0xa talk☆10May 5, 2019Updated 6 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- Some concept code for bypassing the Android lock screen from recovery mode☆16Mar 28, 2011Updated 14 years ago
- Music Player Daemon monitoring☆10Feb 3, 2015Updated 11 years ago
- Agressor script for Cobalt Strike to mark users as owned in bloodhound from the Cobalt Strike credentials tab.☆12Dec 21, 2019Updated 6 years ago
- PrettyRecon-cli is an unofficial cli client for PrettyRecon. This tool can be used to trigger various tasks on prettyrecon as well as fe…☆10May 9, 2025Updated 9 months ago
- ☆10Mar 31, 2016Updated 9 years ago
- Process doppelganging POC using direct system calls, PPID spoofing and dropbox as an external delivery channel for the payload.☆16Jan 7, 2021Updated 5 years ago
- SANS #CTI Summit 2025☆13Jan 28, 2025Updated last year
- P2P Communications of Named Pipes☆12Dec 11, 2025Updated 2 months ago
- Frontend to import Nmap Scan in ES, and frontend to make search☆10Nov 16, 2014Updated 11 years ago