0vulns / NSA.py
Eternalblue & DoublePulsar scanner
☆19Updated 7 years ago
Alternatives and similar repositories for NSA.py:
Users that are interested in NSA.py are comparing it to the libraries listed below
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- Shellcode / Buffer Overflow 💣☆20Updated 4 years ago
- Collection of cracked malware☆14Updated 6 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- shadowbroker SMB exploit scanner. Scans for ETERNALSYNERGY ETERNALBLUE ETERNALROMANCE ETHERNALCHAMPION☆36Updated 7 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 7 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 6 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 5 years ago
- pure python remote adb scanner + nmap scan module☆21Updated 6 years ago
- Python script that acts like the original sudo binary to fool users into entering their passwords☆18Updated 8 years ago
- Python implementation of the SlowLoris DoS attack.☆22Updated 7 years ago
- A simple and cross-platform Remote Administration Tool written in Ruby☆16Updated 7 years ago
- Simple Linux RootKit written in python☆10Updated 7 years ago
- web information gathering / Grab links☆42Updated 5 years ago
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.☆28Updated 6 years ago
- Malicious Software SRC Extract☆30Updated 2 years ago
- Launch a Windows EXE file with this EXE file (application filter evasion)☆12Updated 7 years ago
- Dependencies for Veil 3☆18Updated 7 years ago
- Commands to perform various activities related to penetration testing and red teaming☆20Updated 5 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- This tool audits a website before hand and can exploit vulnerabilities if the website scanned has any.☆14Updated 11 years ago
- Exploit XXE Out-Of-Band Vulnerability Easily☆15Updated 8 years ago
- Information Stealers Wall of Sheep (IS-WOS)☆12Updated 4 years ago
- Windows Encrypt/Decrypt using AES 256 bit keys☆12Updated 4 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …