REPTILEHAUS / Eternal-BlueLinks
REPTILEHAUS' simplified build process of Worawit Wang' (@sleepya_) version of EternalBlue.. The NSA exploit brought to you by the ShadowBrokers for exploiting MS17-010
☆125Updated 2 years ago
Alternatives and similar repositories for Eternal-Blue
Users that are interested in Eternal-Blue are comparing it to the libraries listed below
Sorting:
- PowerShell Empire mod to post-exploit the World!☆136Updated 6 years ago
- Custom tools and projects about security☆110Updated 4 years ago
- Collection of different exploits☆182Updated 4 years ago
- DEPRECATED - A wrapper around gobuster that automatically scans newly discovered directories.☆116Updated 4 years ago
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆142Updated 3 years ago
- An implementation of NSA's ExplodingCan exploit in Python☆263Updated 7 years ago
- Enyx SNMP IPv6 Enumeration Tool☆102Updated 2 years ago
- FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.☆254Updated 2 years ago
- This is a weaponized WSUS exploit☆285Updated 2 years ago
- Basics of Windows privilege escalation☆133Updated 7 years ago
- Windows Pentest Scripts☆231Updated 7 years ago
- A simple PowerShell script that we can use for easing the process of creating a reverse shell and automating Meterpreter update☆66Updated 5 years ago
- A Linux enumeration script for Hack The Box☆189Updated 5 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆286Updated 6 years ago
- This is a rich-featured Visual Basic macro code for use during Penetration Testing assignments, implementing various advanced post-exploi…☆143Updated 3 years ago
- Extensible Red Team Framework☆111Updated 5 years ago
- ☆169Updated 7 years ago
- Remote Command Execution as SYSTEM on Windows IoT Core (releases available for Python2.7 & Python3)☆381Updated 4 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆93Updated 8 years ago
- My collection of metasploit auxiliary post-modules☆191Updated 6 years ago
- Explore the network using VPNPivot tool☆270Updated 8 years ago
- Generator of malicious Ace files for WinRAR < 5.70 beta 1☆125Updated 5 years ago
- Quick Malicious ClickOnceGenerator for Red Team☆249Updated 4 years ago
- pentest tools☆41Updated 7 years ago
- Linux Local Enumeration Script☆79Updated 4 years ago
- SMB Spider is a lightweight python utility for searching SMB/CIFS/Samba file shares. While performing a penetration test, the need to sea…☆134Updated 3 years ago
- Functions that can be used to gain Reverse Shells with PowerShell☆83Updated 2 years ago
- APT34/OILRIG leak☆231Updated 6 years ago
- Shadow Brokers NSA fuzzbunch tool leak . With windows auto instalation script☆207Updated 4 years ago
- Uses Core's Impacket Library to get the password policy from a windows machine☆39Updated 3 months ago