0vulns / NSA.pyLinks
Eternalblue & DoublePulsar scanner
☆26Updated 8 years ago
Alternatives and similar repositories for NSA.py
Users that are interested in NSA.py are comparing it to the libraries listed below
Sorting:
- Repository of tools used in my blog☆51Updated last year
- Remote Access Trojan(RAT), Miner, DDoS☆35Updated 9 years ago
- Agent Tesla Spyware C2 Exploit [PATCHED]☆32Updated 7 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits key☆31Updated 7 years ago
- HTTP botnet☆63Updated 9 years ago
- 4/5 of the leaks provided by TheShadowBrokers containing content from The Equation Group.☆15Updated 8 years ago
- Web App Pen Tester (Web Interface)☆32Updated 3 years ago
- python remote access trojan☆39Updated 9 years ago
- Red Team Tool Kit☆16Updated 6 years ago
- Malicious Software SRC Extract☆32Updated 3 years ago
- Penetration testing bot for BeEF and Armitage/Cobalt Strike integration.☆23Updated 9 years ago
- Archive of leaked Equation Group materials☆16Updated 9 years ago
- FUZZBUNCH - NSA security tools☆81Updated 8 years ago
- Arduino's version of Rubber ducky project watched in mr robot (based on https://www.hak5.org/blog/15-second-password-hack-mr-robot-style)☆34Updated 8 years ago
- Exploit Pack - Project☆73Updated 6 years ago
- Metasploit/MSFVenom Payload Generator Stand Alone☆30Updated 8 years ago
- It is a tool that brings together exploits and news about security and vulnerabilities, with the intention of contributing to the open so…☆66Updated 7 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 6 years ago
- This is the list of all rootkits found so far on github and othersites.☆30Updated 5 years ago
- Miscellaneous exploit code☆21Updated 9 years ago
- Small backdoor using cookie.☆63Updated 9 years ago
- Collection of cracked malware☆15Updated 7 years ago
- Windows Auto Post Exploitation - For ReD Team☆15Updated 6 years ago
- A simple python reverse shell written just for fun.☆62Updated 3 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Updated 4 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆53Updated 7 years ago
- pen testing scripts☆12Updated 5 years ago
- A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a dec…☆33Updated 6 years ago
- Package manager for hackers built by hackers☆36Updated 7 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆29Updated 2 months ago