649 / EquationDrugLinks
The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use for research purposes only.
☆18Updated 7 years ago
Alternatives and similar repositories for EquationDrug
Users that are interested in EquationDrug are comparing it to the libraries listed below
Sorting:
- A Catalog of Application Whitelisting Bypass Techniques☆31Updated 10 years ago
- ☆12Updated 8 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆47Updated 8 years ago
- PoCs discovered through fuzzing which resulted in a CVE assignment.☆18Updated 5 years ago
- ☆36Updated 5 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆14Updated 10 years ago
- Random stuff☆16Updated 7 years ago
- A set of compiled application restriction bypasses☆30Updated 8 years ago
- ☆65Updated 8 years ago
- [WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)☆14Updated 8 years ago
- My metasploit modules☆24Updated 9 years ago
- ☆29Updated 8 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆26Updated 7 years ago
- Side Channel script☆25Updated 2 years ago
- Execute shellcode and evade AV detection with python.☆15Updated 10 years ago
- ☆24Updated 7 years ago
- Main repository to pull all Cisco related projects.☆15Updated 8 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆55Updated 6 years ago
- ☆16Updated 5 years ago
- ☆14Updated 6 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆39Updated 10 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆24Updated 7 years ago
- A cross platform tool for verifying credentials and executing single commands☆32Updated 6 years ago
- ☆43Updated 6 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆28Updated 8 years ago
- ☆35Updated 7 years ago