Just another repository holding files of Shadow Brokers. Extracted myself.
☆52Apr 9, 2017Updated 8 years ago
Alternatives and similar repositories for ShadowBrokers
Users that are interested in ShadowBrokers are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The ORIGINAL decrypted copies of the Shadow Broker's Lost In Translation release. Contains FuzzBunch, DanderSpritz, and all the other NSA…☆20Apr 16, 2017Updated 8 years ago
- Mirror of Shadowbrokers release from https://steemit.com/shadowbrokers/@theshadowbrokers/lost-in-translation☆501Apr 14, 2017Updated 8 years ago
- build system to cross-compile cydia packages for cydia.radare.org☆10Aug 23, 2019Updated 6 years ago
- Data exfiltration PoC scripts☆25Sep 11, 2015Updated 10 years ago
- Guides, Tools, Tips and such for working with the Shadow Brokers dumps☆240Dec 6, 2018Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Exploit XXE Out-Of-Band Vulnerability Easily☆16Jul 28, 2016Updated 9 years ago
- Communicate with a remote shell easily☆12Dec 10, 2017Updated 8 years ago
- FUZZBUNCH - NSA security tools☆81Apr 16, 2017Updated 8 years ago
- FIREWALL EXPLOITS COPY OF NSA EQUATION GROUP SHADOW BROKERS☆20Sep 22, 2016Updated 9 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's Don't Forget Your Base release. Contains Equation group's collection of tools primar…☆18Jan 29, 2018Updated 8 years ago
- Maltego transform to detect the OpenSSL Heartbleed vulnerability (CVE-2014-0160)☆18May 1, 2014Updated 11 years ago
- p0f Python Wrapper☆17Sep 29, 2013Updated 12 years ago
- Module to decrypt the database file created by enpass with given credentials.☆17Feb 20, 2017Updated 9 years ago
- Metasploit things, modules, plugins, exploits☆26Aug 8, 2014Updated 11 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Apr 29, 2017Updated 8 years ago
- Intro to Moose class☆19Jun 16, 2019Updated 6 years ago
- Launch hacking tests in cloud providers securely, isolated and without raise security alerts in the provider☆16Dec 12, 2017Updated 8 years ago
- Malicious use of macho, such as dump-runtime-macho, function-hook.☆15Mar 20, 2017Updated 9 years ago
- kernel source for Xperia XZ Premium☆10Feb 16, 2020Updated 6 years ago
- 万象优图智能鉴黄Python SDK(非官方)☆13Nov 24, 2015Updated 10 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆26Jan 29, 2018Updated 8 years ago
- Public Advisories for Security Vulnerabilities.☆25Mar 14, 2015Updated 11 years ago
- Kernel Wi-Fi/Bluetooth driver for the Pixel 6, Pixel 6 Pro, Pixel 6a, Pixel 7, Pixel 7 Pro and Pixel Fold.☆17Sep 3, 2025Updated 6 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Dec 15, 2022Updated 3 years ago
- Shell-style script to search exploit-db.com exploits.☆62Sep 7, 2024Updated last year
- Metasploit modules that didn't make it into trunk for some reason or the other☆118Jun 17, 2017Updated 8 years ago
- SHIFT后门,适用于windows xp\2003 server\2008 server☆17May 4, 2014Updated 11 years ago
- A program used to communicate with iBoot / iBSS using the libusb-1.0 api.☆16Aug 15, 2010Updated 15 years ago
- Atmosphère is a work-in-progress customized firmware for the Nintendo Switch.☆11Jun 17, 2019Updated 6 years ago
- Proof of concept exploit for CVE-2017-3599☆23Apr 18, 2017Updated 8 years ago
- SMS spoofing is a technique where people replace or alter the originating mobile number of a text message with an alphanumeric text of th…☆26Mar 16, 2024Updated 2 years ago
- [DEPRECATED] Locally-installed tools required by the DexPatcher Gradle v1 plugins☆13Mar 21, 2019Updated 7 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- This repository is dedicated to providing comprehensive mappings of the OWASP Top 10 vulnerabilities for Large Language Models (LLMs) to …☆32Feb 15, 2024Updated 2 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- recon-ng Maltego local transform pack☆39Dec 10, 2013Updated 12 years ago
- Documentation of various share urls and share intents☆15May 7, 2016Updated 9 years ago
- All my POC related to malware development☆15Feb 19, 2026Updated last month
- ☆14Sep 23, 2017Updated 8 years ago
- The official repo of BSIS☆14Feb 16, 2012Updated 14 years ago