PhishSticks: A project made for the course "Infra Project 2023" at Haaga-Helia. Creating tools for ethical pentesting by making a simulated attacks using malicious USB devices.
☆10Dec 12, 2023Updated 2 years ago
Alternatives and similar repositories for PhishSticks
Users that are interested in PhishSticks are comparing it to the libraries listed below
Sorting:
- Command line language server protocol client (LSPC)☆11Jul 31, 2018Updated 7 years ago
- Command palette - Ctrl-P to fuzzy search & run commands, textfilters and descriptions - Micro editor plugin☆27Mar 28, 2024Updated last year
- A framework for backdooring Microsoft Nuget packages.☆10Jan 9, 2024Updated 2 years ago
- Thunderbird Firmware, A fork of PX4 Autopilot Software for Yuneec Typhoon H☆12Mar 26, 2023Updated 2 years ago
- Jump to any function, class or heading with F4. Go, Markdown, Python, C... (+40 others). A plugin for micro editor.☆41Mar 28, 2024Updated last year
- Basic HTTP Server with a feature to invoke a shell in the dir the files are being served from.☆12Apr 14, 2018Updated 7 years ago
- Automatially unzip files added to a specified directory☆14Mar 12, 2022Updated 3 years ago
- making printf work for you☆15Nov 10, 2025Updated 3 months ago
- ☆11Jul 11, 2023Updated 2 years ago
- 一款用于记录终端软件使用时间的开发套件☆12Feb 26, 2022Updated 4 years ago
- fork from A-Protect☆10Nov 26, 2018Updated 7 years ago
- ☆12Jun 22, 2022Updated 3 years ago
- go版本机器学习框架☆10May 8, 2025Updated 9 months ago
- KCP bindings for Rust☆10Feb 1, 2022Updated 4 years ago
- Attempt to use WFP for proxy interception☆10Jan 13, 2019Updated 7 years ago
- A python script to automatically dump files and source code of a Symfony server in debug mode.☆13Feb 11, 2025Updated last year
- Collection of self-made Red Team tools that have come in handy☆12Aug 25, 2024Updated last year
- Code with Windows Hacker☆12Oct 14, 2022Updated 3 years ago
- Quantum Insert Backdoor POC☆11May 21, 2017Updated 8 years ago
- Learn Winapi in this Repo with examples, to understand its abstraction in reverse engineering for Windows.☆11Aug 8, 2022Updated 3 years ago
- 黑客神器,谁用谁知道!☆10Jul 10, 2019Updated 6 years ago
- Demonstrate the behavior of the tunnel cache on Windows☆11Aug 13, 2019Updated 6 years ago
- ☆10Jun 26, 2024Updated last year
- Search-Registry: Find Keys, Value Names, and Value Data in the Registry☆11Jul 3, 2022Updated 3 years ago
- NTLMRelay for MS Exchange☆11Nov 13, 2018Updated 7 years ago
- Toolkit for Active Directory security assessments.☆10Jun 4, 2024Updated last year
- TeamsSix 的个人博客☆10Sep 6, 2025Updated 5 months ago
- MiniO verify interface sensitive information disclosure vulnerability (CVE-2023-28432)☆10Mar 24, 2023Updated 2 years ago
- NASM listing to shellcode converter☆14May 6, 2018Updated 7 years ago
- Threadless Injection Payload Toolkit☆12Oct 12, 2023Updated 2 years ago
- Volumetric Development☆11Mar 19, 2024Updated last year
- An demonic library to write PE binaries☆11Feb 12, 2024Updated 2 years ago
- oh no oh no this is not good very bad very good☆11Mar 8, 2023Updated 2 years ago
- SyscallLoader☆11Sep 13, 2021Updated 4 years ago
- Sophos Central PowerShell module☆11Jul 11, 2023Updated 2 years ago
- Query LDAP and AD with SQL☆10Jun 17, 2021Updated 4 years ago
- ☆12Jul 2, 2023Updated 2 years ago
- HTTP based framework for building command and control components for remote access trojans☆15Aug 2, 2021Updated 4 years ago
- ☆14Sep 26, 2023Updated 2 years ago