0xAcid / ShadowBrokersLinks
Just another repository holding files of Shadow Brokers. Extracted myself.
☆45Updated 8 years ago
Alternatives and similar repositories for ShadowBrokers
Users that are interested in ShadowBrokers are comparing it to the libraries listed below
Sorting:
- The ORIGINAL decrypted copies of the Shadow Broker's Lost In Translation release. Contains FuzzBunch, DanderSpritz, and all the other NSA…☆20Updated 8 years ago
- Massive arsenal of hacker tools...☆79Updated 7 years ago
- Black Nurse DOS attack☆72Updated 7 years ago
- Run Kali tools on all distributions. Offline search, including in package descriptions.☆108Updated 7 years ago
- MitM pentesting opensource toolkit (scan/sniff/exploit) -- NOT SUPORTED ANYMORE --☆75Updated 8 years ago
- Autosploit = Automating Metasploit Modules.☆77Updated 6 years ago
- FUZZBUNCH - NSA security tools☆76Updated 8 years ago
- 📡🔍Searches for wifi-pineapple traces and calculate wireless network security score 🍍☆160Updated 5 years ago
- Curated archive of tools from the Wikileaks CIA hacking tool leak, pull requests welcome https://wikileaks.org/ciav7p1/☆126Updated 8 years ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code.☆34Updated 8 years ago
- Use Tor for anonymous scanning with nmap☆84Updated 10 years ago
- Automatically exported from code.google.com/p/hexorbase☆74Updated 7 years ago
- shadowbroker SMB exploit scanner. Scans for ETERNALSYNERGY ETERNALBLUE ETERNALROMANCE ETHERNALCHAMPION☆37Updated 8 years ago
- Arduino Rubber Ducky Framework☆107Updated 6 years ago
- Post-Exploitation Framework☆78Updated 8 years ago
- Archive of leaked Equation Group materials☆15Updated 9 years ago
- Shodan.io Command Line Interface☆44Updated 4 years ago
- The Metasploit GUI☆90Updated 8 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 7 years ago
- Transferring Backdoor Payload by BSSID and Wireless traffic☆59Updated 2 years ago
- A Kali Linux Tool to assist with security audits and pentesting. Lots of wrappers for commonly used tools to help extend their usefulness…☆31Updated 12 years ago
- Automatic USB drive malware scanning tool for the security-minded person☆97Updated 8 years ago
- Samsung TV Denial of Service (DoS) Attack☆36Updated 8 years ago
- giskismet – Wireless recon visualization tool☆55Updated 9 years ago
- Python - Human Interface Device Android Attack Framework☆47Updated 8 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆20Updated 9 years ago
- USB-Rubber-Ducky Payload - Mimikatz in Memory w UAC Bypass☆37Updated 9 years ago
- Creating a wireless rifle de-authentication gun, which utilized a yagi antenna and a Raspberry Pi.☆68Updated 9 years ago
- cisco-torch : mass scanning, fingerprinting, and exploitation tool☆44Updated 9 years ago
- Penetration testing bot for BeEF and Armitage/Cobalt Strike integration.☆22Updated 9 years ago