Mirror of Shadowbrokers release from https://steemit.com/shadowbrokers/@theshadowbrokers/lost-in-translation
☆513Apr 14, 2017Updated 9 years ago
Alternatives and similar repositories for shadowbrokers-exploits
Users that are interested in shadowbrokers-exploits are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 4/5 of the leaks provided by TheShadowBrokers containing content from The Equation Group.☆15Jul 11, 2017Updated 8 years ago
- Just another repository holding files of Shadow Brokers. Extracted myself.☆55Apr 9, 2017Updated 9 years ago
- ShadowBroker Tools Decrypted☆16Apr 14, 2017Updated 9 years ago
- Guides, Tools, Tips and such for working with the Shadow Brokers dumps☆245Dec 6, 2018Updated 7 years ago
- Decrypted content of eqgrp-auction-file.tar.xz☆4,198May 24, 2017Updated 8 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆12Apr 14, 2017Updated 9 years ago
- NSA finest tool☆991Apr 17, 2017Updated 9 years ago
- Decrypted content of odd.tar.xz.gpg, swift.tar.xz.gpg and windows.tar.xz.gpg☆1,994Apr 14, 2017Updated 9 years ago
- networked status aggregator sees all☆14Apr 26, 2021Updated 5 years ago
- NSA's IIS 6.0 exploit that creates a remote backdoor.☆19Feb 12, 2019Updated 7 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆291May 14, 2019Updated 6 years ago
- Malware exploits☆560Aug 22, 2025Updated 8 months ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆92Apr 20, 2017Updated 9 years ago
- Various PoCs☆501Jan 27, 2020Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆443Jul 11, 2017Updated 8 years ago
- Exploitkit☆188Dec 10, 2016Updated 9 years ago
- Dockerized version of Sn1per (https://github.com/1N3/Sn1per)☆60Apr 29, 2018Updated 8 years ago
- MS17-010☆2,242Jun 20, 2023Updated 2 years ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,910Jan 24, 2024Updated 2 years ago
- Free sampling of files from the purported Equation Group hack.☆11Apr 10, 2017Updated 9 years ago
- Module of Metasploit to exploit the vulnerability Eternalblue-Doublepulsar.☆1,149Mar 31, 2021Updated 5 years ago
- Forward local or remote tcp ports through SMB pipes.☆297Mar 7, 2021Updated 5 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆726Nov 19, 2017Updated 8 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆312Sep 10, 2018Updated 7 years ago
- Domain fronting using Google app engine☆53Feb 19, 2018Updated 8 years ago
- Collection of PowerShell scripts☆452Dec 18, 2017Updated 8 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆110Sep 26, 2017Updated 8 years ago
- Burp-Automator: A Burp Suite Automation Tool with Slack Integration. It can be used with Jenkins and Selenium to automate Dynamic Applica…☆535Aug 1, 2018Updated 7 years ago
- Run PowerShell command without invoking powershell.exe☆1,551Apr 9, 2026Updated 3 weeks ago
- AntiVirus Evasion Tool☆1,751Apr 23, 2025Updated last year
- ☆44Sep 28, 2016Updated 9 years ago
- DefCon24☆121Sep 2, 2016Updated 9 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Red Team Tips as posted by @vysecurity on Twitter☆1,116Apr 26, 2020Updated 6 years ago
- Exploiting Edge's read:// urlhandler☆15Oct 23, 2021Updated 4 years ago
- The exploit samples database is a repository for **RCE** (remote code execution) exploits and Proof-of-Concepts for **WINDOWS**, the samp…☆749Dec 11, 2023Updated 2 years ago
- An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)☆339Jul 31, 2024Updated last year
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,108Nov 3, 2017Updated 8 years ago
- Exploit primitives for PowerShell☆435Mar 25, 2018Updated 8 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago