0x27 / EquationSmasherView external linksLinks
NSA EquationGroup C&C Hunter using the Shodan API
☆29Jul 8, 2015Updated 10 years ago
Alternatives and similar repositories for EquationSmasher
Users that are interested in EquationSmasher are comparing it to the libraries listed below
Sorting:
- Uses Shodan to locate HackingTeam C&C Servers.☆79Jul 14, 2015Updated 10 years ago
- Database of Internet Facing TN3270 Mainframes☆23Jul 31, 2015Updated 10 years ago
- WAF Exploitation Framework☆13Aug 25, 2023Updated 2 years ago
- Moovbox Mismanagement Utilities☆15Mar 21, 2015Updated 10 years ago
- put this here because archival reasons.☆28Feb 18, 2018Updated 7 years ago
- A TE executable format loader for IDA☆28Sep 14, 2015Updated 10 years ago
- A while back antirez, in a post to Bugtraq, detailed a new Tcp portscan method.☆16Apr 21, 2017Updated 8 years ago
- Replaces all .jpg and .png with a picture of nicolas cage.☆10Jun 10, 2014Updated 11 years ago
- random python stuff☆26Jan 7, 2016Updated 10 years ago
- ☆17Nov 25, 2015Updated 10 years ago
- dnmap revised (dnmapR) is a modernized and enhanced version of dnmap☆34Jan 22, 2019Updated 7 years ago
- runtime code injector for Linux☆26May 29, 2011Updated 14 years ago
- Python SDK to access the vulnerability database☆22Sep 5, 2019Updated 6 years ago
- Fast Wi-Fi hijacker in C, based on AirPwn ideas and LORCON☆22Sep 21, 2017Updated 8 years ago
- ssh public host key scanner using shodan☆118Mar 11, 2019Updated 6 years ago
- ☆48Nov 28, 2016Updated 9 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆49Feb 15, 2017Updated 8 years ago
- Simple python client to upload files to the transfer.sh service☆10Dec 19, 2016Updated 9 years ago
- Some setup scripts for security research tools.☆11May 10, 2015Updated 10 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- ☆10Jan 4, 2015Updated 11 years ago
- Here comes the paintrain!☆11Aug 8, 2016Updated 9 years ago
- ☆12Dec 1, 2013Updated 12 years ago
- Frontend to import Nmap Scan in ES, and frontend to make search☆10Nov 16, 2014Updated 11 years ago
- ☆14Dec 5, 2014Updated 11 years ago
- IDA Pro Instruction Reference Plugin☆14Oct 2, 2019Updated 6 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆62Oct 11, 2015Updated 10 years ago
- TinySHell port to SCTP☆127Oct 19, 2013Updated 12 years ago
- WAF Cookie Fetcher is a Burp Suite extension written in Python, which uses a headless browser to obtain the values of WAF-injected cookie…☆16Jan 16, 2018Updated 8 years ago
- ☆12Jun 29, 2021Updated 4 years ago
- A proxy for allowing a public IP address to host a service actually provided by a hidden backend.☆15Jul 12, 2016Updated 9 years ago
- Ruby On Rails unrestricted render() exploit☆16Feb 9, 2018Updated 8 years ago
- ☆13Jun 11, 2014Updated 11 years ago
- Powershell tool to download malware samples.☆12Feb 10, 2016Updated 10 years ago
- ☆11Feb 11, 2023Updated 3 years ago
- Artefacts from various retefe campaigns☆10Mar 9, 2019Updated 6 years ago
- ☆16May 9, 2016Updated 9 years ago
- IDS/IPS malware download evasion☆15Feb 21, 2019Updated 6 years ago
- Mobile phone PWN tools and scripts☆15Sep 20, 2020Updated 5 years ago