649 / FuzzBunchLinks
The ORIGINAL decrypted copies of the Shadow Broker's Lost In Translation release. Contains FuzzBunch, DanderSpritz, and all the other NSA [Equation Group] toolkits. Please use them only for researching purposes.
☆20Updated 8 years ago
Alternatives and similar repositories for FuzzBunch
Users that are interested in FuzzBunch are comparing it to the libraries listed below
Sorting:
- The ORIGINAL decrypted copies of the Shadow Broker's Don't Forget Your Base release. Contains Equation group's collection of tools primar…☆18Updated 8 years ago
- ☆47Updated 10 years ago
- Automated Brute-Force Login Attacks Against EAP Networks.☆58Updated 5 years ago
- ☆17Updated 10 years ago
- Scapy Penetration testing scripts☆21Updated 10 years ago
- Web shells for use in penetration testing☆41Updated 10 years ago
- We collect many tools used in buffer overflow development in one place, repeating with new idea is not a shame - thanks China :)☆35Updated 12 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Updated 2 years ago
- This repo is all about myself coded exploit codes :)☆55Updated 6 years ago
- Post-exploitation scripts for OS X persistence and privesc☆73Updated 8 years ago
- Miscellaneous projects related to attacking Windows.☆28Updated 6 years ago
- shadowbroker SMB exploit scanner. Scans for ETERNALSYNERGY ETERNALBLUE ETERNALROMANCE ETHERNALCHAMPION☆41Updated 8 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 8 years ago
- Automated HaveIbeenPwned lookups using theharvester results☆50Updated 8 years ago
- Software exploitation training material☆16Updated 8 years ago
- Transferring Backdoor Payload by BSSID and Wireless traffic☆58Updated 2 years ago
- ☆77Updated 6 years ago
- ☆40Updated 7 years ago
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆97Updated 5 years ago
- Projects and POCs☆61Updated 11 years ago
- A modular pentesting framework implemented in C☆13Updated 7 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 8 years ago
- Collection of tools for privesc on Linux☆34Updated 12 years ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code.☆34Updated 9 years ago
- ssh session type for metasploit☆101Updated 3 years ago
- Multi source CVE/exploit parser.☆27Updated 8 years ago
- Inject beef hooks into HTTP traffic and track hooked systems from cmdline☆125Updated 10 years ago
- Network based protocol fuzzer☆74Updated 3 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 10 years ago