0xAcid / ShadowBrokersLinks
Just another repository holding files of Shadow Brokers. Extracted myself.
☆51Updated 8 years ago
Alternatives and similar repositories for ShadowBrokers
Users that are interested in ShadowBrokers are comparing it to the libraries listed below
Sorting:
- The ORIGINAL decrypted copies of the Shadow Broker's Lost In Translation release. Contains FuzzBunch, DanderSpritz, and all the other NSA…☆20Updated 8 years ago
- FUZZBUNCH - NSA security tools☆81Updated 8 years ago
- Massive arsenal of hacker tools...☆79Updated 8 years ago
- The Metasploit GUI☆93Updated 9 years ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code.☆34Updated 9 years ago
- Automatically exported from code.google.com/p/hexorbase☆75Updated 8 years ago
- Autosploit = Automating Metasploit Modules.☆77Updated 6 years ago
- Wi-Fi Backdoors☆42Updated 10 years ago
- Transferring Backdoor Payload by BSSID and Wireless traffic☆58Updated 2 years ago
- shadowbroker SMB exploit scanner. Scans for ETERNALSYNERGY ETERNALBLUE ETERNALROMANCE ETHERNALCHAMPION☆41Updated 8 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆13Updated 9 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆53Updated 7 years ago
- Penetration testing bot for BeEF and Armitage/Cobalt Strike integration.☆23Updated 9 years ago
- FIREWALL EXPLOITS COPY OF NSA EQUATION GROUP SHADOW BROKERS☆20Updated 9 years ago
- Open Standard Vulnerability & Compliance Scanner☆46Updated 10 years ago
- Social Engineering Toys☆37Updated 10 years ago
- Plugins for the King Phisher open source phishing campaign toolkit.☆84Updated 4 years ago
- Remote Administration Tool for Windows☆19Updated 10 years ago
- ☆84Updated 2 years ago
- giskismet – Wireless recon visualization tool☆55Updated 9 years ago
- Forced Man-In-The-Middle HTTPs-Avoiding Reverse Proxy☆62Updated 6 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆41Updated 10 years ago
- USB-Rubber-Ducky Payload - Mimikatz in Memory w UAC Bypass☆39Updated 10 years ago
- A few simple scripts and templates I have used during various phishing engagements.☆59Updated 10 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆35Updated 9 years ago
- Simple Webshell Scanner☆55Updated 11 years ago
- MitM pentesting opensource toolkit (scan/sniff/exploit) -- NOT SUPORTED ANYMORE --☆76Updated 9 years ago
- Shodan.io Command Line Interface☆43Updated 4 years ago
- Use Tor for anonymous scanning with nmap☆91Updated 10 years ago
- Red Login: SSH Brute-force Tools☆106Updated 7 years ago