649 / EquationDrugLinks
The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use for research purposes only.
☆26Updated 8 years ago
Alternatives and similar repositories for EquationDrug
Users that are interested in EquationDrug are comparing it to the libraries listed below
Sorting:
- A Catalog of Application Whitelisting Bypass Techniques☆31Updated 11 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 9 years ago
- ☆12Updated 8 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆28Updated 7 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 6 years ago
- ☆63Updated 9 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆55Updated 7 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆47Updated 8 years ago
- ☆24Updated 9 years ago
- ☆36Updated 6 years ago
- PowerShell Reverse HTTPs Shell☆29Updated 11 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆19Updated 12 years ago
- Repository for Windows 10 x64 kernel research, exploitation learning, and reference/supplementary code.☆14Updated 5 years ago
- Python script to patch the reflective stub in a DLL☆24Updated 8 years ago
- ☆28Updated 9 years ago
- My metasploit modules☆24Updated 10 years ago
- Several self-defense shellcodes☆23Updated 6 years ago
- A set of compiled application restriction bypasses☆30Updated 8 years ago
- ☆24Updated 6 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆47Updated 5 years ago
- ☆43Updated 6 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆28Updated 8 years ago
- Just some random stuff for AppLocker☆18Updated 7 years ago
- Framework for Making Environmental Keyed Payloads☆14Updated 9 years ago
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆50Updated last week
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆14Updated 11 years ago
- Various Crypter Project☆10Updated 11 years ago
- Random stuff☆16Updated 7 years ago
- ☆16Updated 5 years ago
- Simplified version of Forshaw's Diaghub Collector Exploit☆31Updated 6 years ago