Subhamdg / NSA_doublepulsarLinks
Double pulsar tool of NSA leaked by SHADOW BROKERS
☆13Updated 8 years ago
Alternatives and similar repositories for NSA_doublepulsar
Users that are interested in NSA_doublepulsar are comparing it to the libraries listed below
Sorting:
- Note:- Run this Script in root user.☆16Updated 7 years ago
- Config-Exploiter Dump config.php file from joomla and wordpress websites☆38Updated 6 years ago
- Package manager for hackers built by hackers☆37Updated 7 years ago
- DVR-Exploiter a Bash Script Program Exploit The DVR's Based on CVE-2018-9995☆107Updated 6 years ago
- Samsung TV Denial of Service (DoS) Attack☆36Updated 8 years ago
- Chaotic Crypto Stealth VPN for Anonymity and Untraceable Hacking Attacks with Linux and Android☆105Updated 5 years ago
- keylogger + cryptojacking extension chrome and mozilla ,basic malware browser Keylogger capture credentials,IP ,and send inormations to a…☆33Updated 4 years ago
- Kill Any Antivirus Using Python For Windows Users .☆45Updated 9 years ago
- Social Engineering Framework is a framework to hack mind and sniff and exploit and many features more☆19Updated 8 years ago
- Programmed For Penetration Testing Beginners . This Program Based on Mdk3 . "WiFi Stress Testing Beacon Flooding & Deauthentication Attac…☆90Updated 6 years ago
- python remote access trojan☆37Updated 8 years ago
- Search for leaked creadentials on pwndb using the command line and tor.☆24Updated 6 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆24Updated 4 years ago
- Framework for obtaining all the credentials stored in vulnerable Netwave IP cameras. Can be used to break into IP cameras, use for resear…☆37Updated 5 years ago
- A quick, dirty, and effective USB RubberDucky (hak5.com) firmware programming script. Cause typing is hard.☆20Updated 11 years ago
- SMS Phishing Tools☆79Updated 8 years ago
- Massive arsenal of hacker tools...☆79Updated 7 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits key☆30Updated 6 years ago
- QRLJacking or Quick Response Code Login Jacking is a simple-but-nasty attack vector affecting all the applications that relays on “Login…☆13Updated 8 years ago
- Vault 7: CIA Hacking Tools Revealed☆17Updated 8 years ago
- #Super-dracOS Dracos Linux is an open source operating system provides to penetration testing. Packed with a ton of pentest tools includi…☆36Updated 8 years ago
- Full Auto Exploit tool to SQL Injection: Admin Find -dork generation and grab from cx-Security and proxy cheaker and more :)☆28Updated 7 years ago
- NSA's IIS 6.0 exploit that creates a remote backdoor.☆19Updated 6 years ago
- Metasploit/MSFVenom Payload Generator Stand Alone☆31Updated 8 years ago
- Gmail phishing page sample☆67Updated 4 years ago
- python hash cracker☆52Updated 9 months ago
- Eternalblue & DoublePulsar scanner☆22Updated 8 years ago
- Reverse/ Bind Shell Generator for cross platform systems☆18Updated 7 years ago
- Python script for trying default passwords for some TP-Link Hotspots☆35Updated 4 years ago
- Wi-Fi Backdoors☆39Updated 10 years ago