evan-okeefe / PiNinjaLinks
Turn your Raspberry Pi Pico into a hacking device
☆11Updated last year
Alternatives and similar repositories for PiNinja
Users that are interested in PiNinja are comparing it to the libraries listed below
Sorting:
- Project build for joel and joshua students from Germany | course: Advanced Tactics in information security☆23Updated 7 months ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated last year
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Updated 2 years ago
- Security and Hacking Tools, Exploits, Proof of Concepts, Shellcodes, Scripts.☆59Updated last year
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆18Updated 2 years ago
- ECC Public Key Cryptography☆39Updated last year
- GitHub CVE Repository Hunt☆18Updated last year
- AES-256 Microsoft Cryptography API Example Use.☆31Updated last year
- ☆12Updated last year
- Malware Libraries focused in help Malware Development☆23Updated 2 years ago
- hiding in plain sight: part 2☆45Updated last year
- ☆29Updated last year
- Parent Process ID Spoofing, coded in CGo.☆23Updated 4 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆32Updated last week
- A mechanism that trampoline hooks functions in x86/x64 systems.☆22Updated 10 months ago
- Tool to retrieve Config from Redline C2 servers☆16Updated 2 years ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Updated last year
- A PowerShell script that simplifies life and therefore... phishing.☆19Updated 3 years ago
- Python program Fileless-PE.py generates a Python script (PEloader.py) to load a DLL or EXE file from a given URL. It provides functionali…☆25Updated last year
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆65Updated 11 months ago
- Linux Malware creator to attack Windows System via Reverse Shell with FindWindow Process Code Injection☆18Updated 2 years ago
- Yandex browser password recovery☆11Updated 4 months ago
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆51Updated 4 years ago
- Slides and videos from talks given at cons☆24Updated 2 months ago
- MalDev & AV-EDR Evasion for Pentesters☆17Updated 2 years ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆49Updated last year
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆27Updated 5 months ago
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆28Updated 11 months ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆40Updated 4 months ago
- ☆13Updated last year