Just another repository holding files of Shadow Brokers. Extracted myself.
☆55Apr 9, 2017Updated 9 years ago
Alternatives and similar repositories for ShadowBrokers
Users that are interested in ShadowBrokers are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Apr 14, 2017Updated 9 years ago
- Steganography Detection Framework☆14Jan 8, 2025Updated last year
- The ORIGINAL decrypted copies of the Shadow Broker's Lost In Translation release. Contains FuzzBunch, DanderSpritz, and all the other NSA…☆20Apr 16, 2017Updated 9 years ago
- Mirror of Shadowbrokers release from https://steemit.com/shadowbrokers/@theshadowbrokers/lost-in-translation☆507Apr 14, 2017Updated 9 years ago
- build system to cross-compile cydia packages for cydia.radare.org☆10Aug 23, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Data exfiltration PoC scripts☆24Sep 11, 2015Updated 10 years ago
- Guides, Tools, Tips and such for working with the Shadow Brokers dumps☆243Dec 6, 2018Updated 7 years ago
- Exploit XXE Out-Of-Band Vulnerability Easily☆16Jul 28, 2016Updated 9 years ago
- Communicate with a remote shell easily☆12Dec 10, 2017Updated 8 years ago
- DefCon - Status page and API for production status☆16Feb 22, 2024Updated 2 years ago
- DEFCON-RUSSIA WEB☆13Mar 30, 2021Updated 5 years ago
- ☆17Mar 25, 2019Updated 7 years ago
- The Convergence Admin Console☆14Mar 7, 2023Updated 3 years ago
- FUZZBUNCH - NSA security tools☆81Apr 16, 2017Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A small Php package to fetch archive url snapshots from archive.org. Using it you can fetch complete list of snapshot urls of any year or…☆19Jun 20, 2021Updated 4 years ago
- FIREWALL EXPLOITS COPY OF NSA EQUATION GROUP SHADOW BROKERS☆20Sep 22, 2016Updated 9 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's Don't Forget Your Base release. Contains Equation group's collection of tools primar…☆18Jan 29, 2018Updated 8 years ago
- Maltego transform to detect the OpenSSL Heartbleed vulnerability (CVE-2014-0160)☆18May 1, 2014Updated 11 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆17Dec 15, 2021Updated 4 years ago
- Unofficial. Splunk MCP server. Implemented in Python and TypeScript/JS. Runs searches, queries Splunk, and outputs data as JSON, CSV, or …☆30Jun 16, 2025Updated 10 months ago
- Add custom data attributes to your Gravity Forms field markup☆16Jan 5, 2023Updated 3 years ago
- p0f Python Wrapper☆17Sep 29, 2013Updated 12 years ago
- Metasploit things, modules, plugins, exploits☆26Aug 8, 2014Updated 11 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- This repository contains a Python client for interfacing with the [crt.sh](https://crt.sh/) website, allowing users to retrieve informati…☆18Sep 1, 2024Updated last year
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Apr 29, 2017Updated 8 years ago
- Intro to Moose class☆19Jun 16, 2019Updated 6 years ago
- PHP后门代码汇总☆14Apr 15, 2016Updated 10 years ago
- Launch hacking tests in cloud providers securely, isolated and without raise security alerts in the provider☆16Dec 12, 2017Updated 8 years ago
- Todo App in using Angular2☆14Mar 9, 2018Updated 8 years ago
- Malicious use of macho, such as dump-runtime-macho, function-hook.☆15Mar 20, 2017Updated 9 years ago
- kernel source for Xperia XZ Premium☆10Feb 16, 2020Updated 6 years ago
- AntennaCalculator: An Open-Source Antenna Design Tool☆21Feb 17, 2026Updated last month
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆26Jan 29, 2018Updated 8 years ago
- "Be careful about reading health books. Some fine day you'll die of a misprint." ― Markus Herz☆24May 20, 2020Updated 5 years ago
- Public Advisories for Security Vulnerabilities.☆25Mar 14, 2015Updated 11 years ago
- Kernel Wi-Fi/Bluetooth driver for the Pixel 6, Pixel 6 Pro, Pixel 6a, Pixel 7, Pixel 7 Pro and Pixel Fold.☆17Sep 3, 2025Updated 7 months ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Dec 15, 2022Updated 3 years ago
- Metasploit modules that didn't make it into trunk for some reason or the other☆118Jun 17, 2017Updated 8 years ago
- NumPy aware dynamic Python compiler using LLVM☆12Nov 7, 2024Updated last year