This is a collection of tools that make up what we call a "Drop-Pi", primarily used as a quick placement device during a physical/social engineering penetration test.
☆35Oct 8, 2024Updated last year
Alternatives and similar repositories for Drop-Pi
Users that are interested in Drop-Pi are comparing it to the libraries listed below
Sorting:
- ☆14Jul 9, 2024Updated last year
- Revised shell script for parsing .gnmap, .xml, or .nmap port scan results files to a CSV list, lists of IPs per port, web urls, and a sum…☆13Apr 17, 2020Updated 5 years ago
- A dotnet executable to get an Entra token in an authenticated runtime☆17Oct 30, 2024Updated last year
- ☆13Aug 20, 2025Updated 7 months ago
- A collection of Metasploit plugins I have written for various reasons.☆15Dec 5, 2020Updated 5 years ago
- NavSec is the most comprehensive passive web vulnerability and privacy scanner. It performs real-time security analysis directly in your …☆23Sep 13, 2025Updated 6 months ago
- Powershell script to get all user devices registered in SCCM.☆15Jul 23, 2021Updated 4 years ago
- Modified SuperTuxKart to support sending CANBus messages☆12Dec 9, 2014Updated 11 years ago
- C++ implementation of Householder QR Factorization☆11Apr 1, 2022Updated 3 years ago
- Repo hacks☆21Dec 7, 2025Updated 3 months ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆45Aug 30, 2023Updated 2 years ago
- This application was built to help reduce the amount of time it takes to review AWS Lambda code.☆61Nov 11, 2024Updated last year
- IP address filter by City☆12Jan 17, 2025Updated last year
- RippleBoard is here☆13Aug 6, 2016Updated 9 years ago
- Default Password Generator for Time Warner / Spectrum Routers☆19Jul 27, 2017Updated 8 years ago
- BSides, OWASP, DEFCON, RSAC, SANS Talk Material, References and Extra Bits☆14Jul 19, 2025Updated 8 months ago
- A C# tool with more flexibility to customize scheduled task for both persistence and lateral movement in red team operation☆18Dec 18, 2024Updated last year
- Quick and dirty dynamic redirect.rules generator☆170Oct 12, 2022Updated 3 years ago
- Framework for modeling and researching C2 communications for developing efficient filtering and detection logic☆23Oct 24, 2024Updated last year
- ☆14Mar 19, 2024Updated 2 years ago
- ☆18Jun 10, 2025Updated 9 months ago
- Neuviks Terraform Red Team Workshop☆14Aug 10, 2025Updated 7 months ago
- DEFCON 32 Badge Game☆61Aug 10, 2024Updated last year
- These are the slide decks and source code for Brute Ratel Seminar conducted on 24th August 2023. The youtube video for the seminar can be…☆22Aug 26, 2023Updated 2 years ago
- ☆36Oct 16, 2023Updated 2 years ago
- NextThingCo C.H.I.P. linux repository retrieved for use with meta-chip Yocto meta layer☆10Nov 8, 2018Updated 7 years ago
- ☆13Sep 7, 2024Updated last year
- PoC script to demonstrate collection of SCCM attack paths that can be viewed in BH with OpenGraph☆24Aug 2, 2025Updated 7 months ago
- A simple BOF implementation of klist using Windows API☆32Jul 7, 2022Updated 3 years ago
- ☆25Aug 14, 2025Updated 7 months ago
- Development guide for Volatility Plugins☆22Sep 6, 2017Updated 8 years ago
- C# program to take a full size screenshot or a recording of the user's desktop. Takes in 0-3 flags☆84Oct 2, 2020Updated 5 years ago
- hack3270 is a python3 based tool to manipulate tn3270 data streams, specifically to perform application penetration testing of mainframe …☆24Feb 21, 2026Updated last month
- Flexible C# shellcode runner☆39Jan 18, 2022Updated 4 years ago
- 🔑 Wi-Fi Captive Portal For NodeMCU for Phishing Wi-Fi Passwords☆22Aug 2, 2024Updated last year
- Red Team Projects with chat.openai.com.☆17Apr 3, 2023Updated 2 years ago
- A bot that uses various APIs to scan links directly inside any discord server automatically☆14Jun 10, 2025Updated 9 months ago
- .NET deserialization hunter☆89Jul 21, 2024Updated last year
- Sp00fer blog post -☆24Jul 19, 2022Updated 3 years ago