完整版:the purported Equation Group(NSA下属) hack by the Shadow Brokers(影子经纪人)--234MB
☆18Jan 25, 2018Updated 8 years ago
Alternatives and similar repositories for EQGRP-Auction-Files
Users that are interested in EQGRP-Auction-Files are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Eternalblue & DoublePulsar scanner☆26Jun 9, 2017Updated 8 years ago
- REPTILEHAUS' simplified build process of Worawit Wang' (@sleepya_) version of EternalBlue.. The NSA exploit brought to you by the ShadowB…☆129Dec 18, 2022Updated 3 years ago
- Zerokit shared code☆17Mar 28, 2019Updated 6 years ago
- Analysis and Modification Tool for Executables☆17Mar 28, 2019Updated 6 years ago
- User-mode part of Zerokit platform☆22Mar 30, 2019Updated 6 years ago
- The goal of this project is to examine, reverse, and document the different modules available in the Equation Group's DanderSpritz post-e…☆334Jun 23, 2018Updated 7 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's Don't Forget Your Base release. Contains Equation group's collection of tools primar…☆18Jan 29, 2018Updated 8 years ago
- This project exploits Microsoft's Skype vulneribility and gets any remote user's IP address.☆10Jan 15, 2015Updated 11 years ago
- SharpSploit is a .NET post-exploitation library written in C#☆16Apr 6, 2020Updated 5 years ago
- ☆12Updated this week
- Example implementations of each attribute available in Nunit2 unit Testing Framework using C# .NET.☆15Jun 1, 2018Updated 7 years ago
- eqgrp-auction decrypted☆13Apr 15, 2017Updated 8 years ago
- Enter Product Key Volatile Environment LPE☆13Jun 28, 2025Updated 8 months ago
- MS17-010 Tester☆13May 20, 2017Updated 8 years ago
- User-mode program parsing logs created by HyperPlatform☆19Aug 15, 2016Updated 9 years ago
- NSA tool hacking☆15May 20, 2018Updated 7 years ago
- Remote Assistance Volatile Environment LPE☆15Jun 28, 2025Updated 8 months ago
- Opensource Telegram (Osint) Tool☆20Jan 3, 2025Updated last year
- CVE-2014-0816☆25Oct 5, 2016Updated 9 years ago
- Meltdown/Spectre experiments☆54Jan 5, 2018Updated 8 years ago
- Sysprep Volatile Environment LPE (2017)☆16Jun 28, 2025Updated 8 months ago
- TaskMgr Volatile Environment LPE☆16Jun 28, 2025Updated 8 months ago
- Masterpiece of PineCoders script https://www.tradingview.com/script/dYqL95JB-Backtesting-Trading-Engine-PineCoders/ in v3, this is the pr…☆11Sep 20, 2022Updated 3 years ago
- Generate repeatable pseudo random numbers and non-cryptographic hash numbers for usage in Node.js and browser environments.☆13Oct 14, 2024Updated last year
- AWS Key Management Service (KMS) makes it easy for you to create and manage cryptographic keys and control their use across a wide range …☆16Jan 26, 2026Updated last month
- a simple keylogger that records hardware inputs like keyboard, mouse, microphone and webcam and sends it to your e-mail.☆14Oct 18, 2024Updated last year
- IA32-doc is a project which aims to put as many definitions from the Intel Manual into machine-processable format as possible☆18Apr 16, 2022Updated 3 years ago
- Hybrid Quantum-Classical LLM NLP Model: Enhancing Text Classification with Quantum Kernels. Dataset from https://www.kaggle.com/datasets…☆14Apr 11, 2025Updated 11 months ago
- Open Web Researcher: is a cutting-edge, AI-powered alternative to tools like SearchGPT and Perplexity. It simplifies web research by refi…☆21Dec 30, 2024Updated last year
- A simple state-of-the-art C++ random number generator☆19Oct 10, 2017Updated 8 years ago
- Performance Monitor Volatile Environment LPE☆18Jun 28, 2025Updated 8 months ago
- OpenFlow DDoS mitigation Ryu controller☆21Dec 21, 2014Updated 11 years ago
- Pseudo-random number generator for EOS.IO☆10May 27, 2019Updated 6 years ago
- EQGRP-Free-Files here.,☆46Aug 16, 2016Updated 9 years ago
- ☆10Aug 18, 2021Updated 4 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆32Nov 11, 2014Updated 11 years ago
- FULL v0, Cursor, Manus, Same.dev, Lovable, Devin, Replit Agent, Windsurf Agent & VSCode Agent (And other Open Sourced) System Prompts, To…☆29Apr 21, 2025Updated 11 months ago
- (This is a fork used primarily to submit patches into upstream repository) Public malware techniques used in the wild: Virtual Machine, E…☆19May 31, 2025Updated 9 months ago
- Audio steganography web app☆18Mar 16, 2020Updated 6 years ago