Mirror of Shadowbrokers release from https://steemit.com/shadowbrokers/@theshadowbrokers/lost-in-translation
☆498Apr 14, 2017Updated 8 years ago
Alternatives and similar repositories for shadowbrokers-exploits
Users that are interested in shadowbrokers-exploits are comparing it to the libraries listed below
Sorting:
- Decrypted content of odd.tar.xz.gpg, swift.tar.xz.gpg and windows.tar.xz.gpg☆1,986Apr 14, 2017Updated 8 years ago
- NSA finest tool☆988Apr 17, 2017Updated 8 years ago
- Decrypted content of eqgrp-auction-file.tar.xz☆4,198May 24, 2017Updated 8 years ago
- networked status aggregator sees all☆14Apr 26, 2021Updated 4 years ago
- Guides, Tools, Tips and such for working with the Shadow Brokers dumps☆237Dec 6, 2018Updated 7 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆291May 14, 2019Updated 6 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆92Apr 20, 2017Updated 8 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆443Jul 11, 2017Updated 8 years ago
- Dockerized version of Sn1per (https://github.com/1N3/Sn1per)☆60Apr 29, 2018Updated 7 years ago
- Exploitkit☆188Dec 10, 2016Updated 9 years ago
- Various PoCs☆502Jan 27, 2020Updated 6 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆109Sep 26, 2017Updated 8 years ago
- Malware exploits☆554Aug 22, 2025Updated 6 months ago
- Forward local or remote tcp ports through SMB pipes.☆296Mar 7, 2021Updated 5 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆729Nov 19, 2017Updated 8 years ago
- Burp-Automator: A Burp Suite Automation Tool with Slack Integration. It can be used with Jenkins and Selenium to automate Dynamic Applica…☆535Aug 1, 2018Updated 7 years ago
- MS17-010☆2,232Jun 20, 2023Updated 2 years ago
- An exploit for Apache Struts CVE-2017-9805☆247Nov 7, 2017Updated 8 years ago
- Run PowerShell command without invoking powershell.exe☆1,534Mar 23, 2023Updated 2 years ago
- Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆313Sep 10, 2018Updated 7 years ago
- Powershell C2 Server and Implants☆575Nov 11, 2019Updated 6 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,109Nov 3, 2017Updated 8 years ago
- Module of Metasploit to exploit the vulnerability Eternalblue-Doublepulsar.☆1,147Mar 31, 2021Updated 4 years ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,901Jan 24, 2024Updated 2 years ago
- Slides from previous conference talks☆41May 13, 2017Updated 8 years ago
- Useful Windows and AD tools☆15Feb 20, 2022Updated 4 years ago
- Miscellaneous exploit code☆1,570Oct 6, 2023Updated 2 years ago
- for mass exploiting☆615Jul 14, 2022Updated 3 years ago
- The exploit samples database is a repository for **RCE** (remote code execution) exploits and Proof-of-Concepts for **WINDOWS**, the samp…☆746Dec 11, 2023Updated 2 years ago
- NSA's IIS 6.0 exploit that creates a remote backdoor.☆19Feb 12, 2019Updated 7 years ago
- EternalRocks worm☆468May 25, 2017Updated 8 years ago
- Collection of social engineering payloads☆300Oct 19, 2017Updated 8 years ago
- Exploit code developed/reproduced by me☆90Jan 25, 2023Updated 3 years ago
- Script used to generate and encode a PowerShell based Metasploit payloads.☆276Apr 20, 2022Updated 3 years ago
- Linux vulnerability scanner based on Salt Open and Vulners audit API, with Slack notifications and JIRA integration☆262Oct 18, 2017Updated 8 years ago
- AntiVirus Evasion Tool☆1,741Apr 23, 2025Updated 10 months ago
- Red Team Tips as posted by @vysecurity on Twitter☆1,069Apr 26, 2020Updated 5 years ago
- Remote Desktop Protocol in Twisted Python☆26Apr 13, 2018Updated 7 years ago