649 / FuzzBunch
The ORIGINAL decrypted copies of the Shadow Broker's Lost In Translation release. Contains FuzzBunch, DanderSpritz, and all the other NSA [Equation Group] toolkits. Please use them only for researching purposes.
☆19Updated 7 years ago
Alternatives and similar repositories for FuzzBunch:
Users that are interested in FuzzBunch are comparing it to the libraries listed below
- The ORIGINAL decrypted copies of the Shadow Broker's Don't Forget Your Base release. Contains Equation group's collection of tools primar…☆15Updated 7 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- A collection of Burp Suite extensions☆30Updated 8 years ago
- shadowbroker SMB exploit scanner. Scans for ETERNALSYNERGY ETERNALBLUE ETERNALROMANCE ETHERNALCHAMPION☆37Updated 7 years ago
- ☆39Updated 7 years ago
- Miscellaneous projects related to attacking Windows.☆28Updated 5 years ago
- Automated Brute-Force Login Attacks Against EAP Networks.☆55Updated 5 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 9 years ago
- Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability☆10Updated 6 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Updated 10 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Updated 7 years ago
- Scripts for OSCE☆18Updated 6 years ago
- Projects and POCs☆60Updated 10 years ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆36Updated 7 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 12 years ago
- Collection of tools for privesc on Linux☆34Updated 11 years ago
- ☆47Updated 9 years ago
- Group Policy Hijacking☆31Updated 6 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- A collection of Nmap NSE scripts that I made.☆27Updated 12 years ago
- These are just some script which you can use to detect and exploit the Apache Struts Vulnerability (CVE-2017-5638)☆17Updated 8 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- only for 31337☆22Updated 8 years ago
- Updated 6 years ago
- Automated install process for Phishing Frenzy☆23Updated 10 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 7 years ago