evan-okeefe / PiNinjaLinks
Turn your Raspberry Pi Pico into a hacking device
☆13Updated last year
Alternatives and similar repositories for PiNinja
Users that are interested in PiNinja are comparing it to the libraries listed below
Sorting:
- Security and Hacking Tools, Exploits, Proof of Concepts, Shellcodes, Scripts.☆65Updated last month
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆19Updated 2 years ago
- Malware Libraries focused in help Malware Development☆26Updated 2 years ago
- Project build for joel and joshua students from Germany | course: Advanced Tactics in information security☆27Updated last year
- Yandex browser password recovery☆11Updated 10 months ago
- AES-256 Microsoft Cryptography API Example Use.☆34Updated last week
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated last year
- Parent Process ID Spoofing, coded in CGo.☆24Updated 9 months ago
- ECC Public Key Cryptography☆37Updated 2 years ago
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Updated 2 years ago
- Divulge Stealer a highly advanced info-stealer that outperforms its predecessor, Umbral-Stealer by Blank-c. This new iteration is a compl…☆16Updated last year
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆26Updated 9 months ago
- A PowerShell script that simplifies life and therefore... phishing.☆20Updated 3 years ago
- ☆27Updated 2 years ago
- A simple website to act as a store for havoc modules and extensions☆28Updated last year
- Threat Hijacking Simple Implementation☆18Updated 11 months ago
- Python3 tool to perform password spraying using RDP☆16Updated 2 years ago
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆50Updated 4 years ago
- Public repo of some woking evilginx phishlets☆40Updated last year
- HEVD Exploits for fun and learning.☆15Updated 5 months ago
- Linux Malware creator to attack Windows System via Reverse Shell with FindWindow Process Code Injection☆19Updated 2 years ago
- A malicious keyboard that delivers a multi-staged attack, consisting of a trojan payload which can bypass antivirus, with Windows machine…☆17Updated 10 months ago
- This tool generates an undetectable Windows reverse shell PowerShell script. Users can configure IP and Port according to their requireme…☆18Updated last year
- Post-Exploitation Tool to Steal MySQL Data, and with persistence extract all data from MySQL table every time that Windows are opened wit…☆13Updated 2 years ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆19Updated 2 years ago
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, a…☆28Updated 2 years ago
- Google Chrome Cookies Stealer. Steals Chrome cookies☆48Updated 2 years ago
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆12Updated 9 months ago
- A C2 framework built for my bachelors thesis☆57Updated 3 weeks ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Updated 2 years ago