evan-okeefe / PiNinjaLinks
Turn your Raspberry Pi Pico into a hacking device
☆12Updated last year
Alternatives and similar repositories for PiNinja
Users that are interested in PiNinja are comparing it to the libraries listed below
Sorting:
- Project build for joel and joshua students from Germany | course: Advanced Tactics in information security☆27Updated 11 months ago
- Security and Hacking Tools, Exploits, Proof of Concepts, Shellcodes, Scripts.☆64Updated last week
- Malware Libraries focused in help Malware Development☆26Updated 2 years ago
- AES-256 Microsoft Cryptography API Example Use.☆35Updated 2 years ago
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Updated 2 years ago
- Linux Malware creator to attack Windows System via Reverse Shell with FindWindow Process Code Injection☆19Updated 2 years ago
- hiding in plain sight: part 2☆45Updated last year
- ECC Public Key Cryptography☆37Updated 2 years ago
- ☆27Updated 2 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆20Updated 2 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆23Updated last year
- Threat Hijacking Simple Implementation☆17Updated 10 months ago
- Yandex browser password recovery☆11Updated 9 months ago
- A PowerShell script that simplifies life and therefore... phishing.☆20Updated 3 years ago
- the assembly shell and backdoor Trojan☆18Updated 4 years ago
- Reverse Shell - technique is commonly used in cyber attacks☆19Updated last year
- TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files☆127Updated last year
- Parent Process ID Spoofing, coded in CGo.☆24Updated 8 months ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Updated last year
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated last year
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Updated 2 years ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆46Updated 8 months ago
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆12Updated 8 months ago
- A python based Bot Net Framework☆43Updated 4 months ago
- ⚔️ Red Team tools for capturing credentials & planting payloads using native Windows features.☆10Updated 3 months ago
- Here are +200 different rats some with source code☆138Updated 2 years ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆81Updated last year
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆26Updated 8 months ago
- Slides and videos from talks given at cons☆25Updated 6 months ago
- One Click Tool to Scan All the Enabled Protection of current Windows NT Kernel☆43Updated 2 years ago