evan-okeefe / PiNinjaLinks
Turn your Raspberry Pi Pico into a hacking device
☆12Updated last year
Alternatives and similar repositories for PiNinja
Users that are interested in PiNinja are comparing it to the libraries listed below
Sorting:
- Project build for joel and joshua students from Germany | course: Advanced Tactics in information security☆27Updated last year
- Security and Hacking Tools, Exploits, Proof of Concepts, Shellcodes, Scripts.☆65Updated 3 weeks ago
- Malware Libraries focused in help Malware Development☆26Updated 2 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆19Updated 2 years ago
- ☆27Updated 2 years ago
- A malicious keyboard that delivers a multi-staged attack, consisting of a trojan payload which can bypass antivirus, with Windows machine…☆17Updated 10 months ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated last year
- AES-256 Microsoft Cryptography API Example Use.☆34Updated 2 years ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆46Updated 9 months ago
- Trojan written in C++ for Windows☆20Updated last year
- Python program Fileless-PE.py generates a Python script (PEloader.py) to load a DLL or EXE file from a given URL. It provides functionali…☆28Updated last year
- Parent Process ID Spoofing, coded in CGo.☆24Updated 9 months ago
- HEVD Exploits for fun and learning.☆15Updated 5 months ago
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆26Updated 2 years ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆26Updated 9 months ago
- Multi-component Remote Access Trojan: C++ client (victim), C# server, and Angular frontend.☆46Updated 8 months ago
- Threat Hijacking Simple Implementation☆17Updated 11 months ago
- ECC Public Key Cryptography☆37Updated 2 years ago
- Payload Dropper with Persistance & Privesc & UAC bypass 🐱👤☆14Updated last year
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆12Updated 9 months ago
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Updated 2 years ago
- Linux Malware creator to attack Windows System via Reverse Shell with FindWindow Process Code Injection☆19Updated 2 years ago
- Tool to retrieve Config from Redline C2 servers☆16Updated 2 years ago
- An offensive security framework for writing payloads☆18Updated 3 years ago
- Yandex browser password recovery☆11Updated 9 months ago
- Malware development in Go, learn today, anti dynamic analysis & Static & sandboxes.☆15Updated 9 months ago
- Ransomware written in go, encrypt - decrypt.☆29Updated 9 months ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆19Updated 2 years ago
- Just another Process Injection using Process Hollowing technique.☆19Updated 2 years ago
- Here are +200 different rats some with source code☆144Updated 2 years ago