649 / EquationDrugLinks
The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use for research purposes only.
☆18Updated 7 years ago
Alternatives and similar repositories for EquationDrug
Users that are interested in EquationDrug are comparing it to the libraries listed below
Sorting:
- A Catalog of Application Whitelisting Bypass Techniques☆31Updated 10 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- ☆28Updated 8 years ago
- ☆36Updated 5 years ago
- Random stuff☆16Updated 7 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆47Updated 8 years ago
- ☆12Updated 8 years ago
- Programmatically access a TLS certificate chain in C++ and C#☆13Updated 6 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13Updated 7 years ago
- [WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)☆14Updated 8 years ago
- PoCs discovered through fuzzing which resulted in a CVE assignment.☆18Updated 5 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆13Updated 10 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- A set of compiled application restriction bypasses☆29Updated 8 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆26Updated 7 years ago
- ☆65Updated 8 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆52Updated 6 years ago
- ☆24Updated 7 years ago
- "Polymorphic" shellcode generator (x86)☆23Updated 10 years ago
- ☆23Updated 9 years ago
- Simple shellcode injector.☆14Updated 6 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- Making shellcode UD - https://osandamalith.com☆24Updated 9 years ago
- collection of useful shells for penetration tests☆37Updated 8 years ago
- APT34/OILRIG leak☆12Updated 6 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆24Updated 7 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 9 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆27Updated 7 years ago
- ☆13Updated 8 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆28Updated 8 years ago