The NSA wants access to your all your data, might as well make it easier for them to access the backend of your WordPress install. When you save the NSA time, you save tax payers money.
☆27Nov 2, 2016Updated 9 years ago
Alternatives and similar repositories for nsa-backdoor
Users that are interested in nsa-backdoor are comparing it to the libraries listed below
Sorting:
- NSA's IIS 6.0 exploit that creates a remote backdoor.☆19Feb 12, 2019Updated 7 years ago
- Latest muhstik release (4.2.2)☆10Mar 25, 2014Updated 11 years ago
- ☆10Apr 2, 2022Updated 3 years ago
- NSA-Proof Secure P2P Chat client☆11Jul 15, 2015Updated 10 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆22May 30, 2015Updated 10 years ago
- ☆10Oct 1, 2016Updated 9 years ago
- ☆10Mar 29, 2022Updated 3 years ago
- Simple CLIENT side bypass for the Microsoft Defender for Cloud Apps Proxy☆16Apr 8, 2022Updated 3 years ago
- Bypass AntiVirus with Python and Metasploit using shellcode☆11Mar 25, 2016Updated 9 years ago
- Driver reverse engineering of the Russian Sandworm hacking group's BlackEnergy malware.☆19Apr 27, 2021Updated 4 years ago
- Tools for assisting the reverse engineering of Qakbot☆11Jul 21, 2021Updated 4 years ago
- FETB : Take URL of File For Analysis using File + ExifTool + Binwalk Commands☆20Feb 2, 2021Updated 5 years ago
- ☆18Dec 27, 2019Updated 6 years ago
- A Botnet builder built on Elasticsearch and Kibana with the help of C++ and Python3☆22Jul 21, 2020Updated 5 years ago
- Intentionally Vulnerable Nodejs Application & APIs☆21Apr 9, 2022Updated 3 years ago
- A proof of concept to dump Django website's source code affected by NGINX's off-by-slash alias directive misconfiguration.☆24Dec 8, 2022Updated 3 years ago
- FIREWALL EXPLOITS COPY OF NSA EQUATION GROUP SHADOW BROKERS☆20Sep 22, 2016Updated 9 years ago
- The Horrific Omnipotent Rootkit☆23Mar 17, 2017Updated 8 years ago
- Eternalblue & DoublePulsar scanner☆26Jun 9, 2017Updated 8 years ago
- OTP-BYPASS-2022 Signaling System is an international telecommunication protocol standard that defines how the network elements in a publi…☆12Oct 10, 2022Updated 3 years ago
- Tool to find SMTP servers vulnerable to open relay☆82Feb 13, 2020Updated 6 years ago
- POC for CVE-2022-23648☆36Mar 29, 2022Updated 3 years ago
- Install, uninstall and control remote and local windows services☆13Feb 4, 2013Updated 13 years ago
- Python Keylogger PortScanner BruteForce and basic hack tools.(new ones will come soon)☆18Mar 30, 2021Updated 4 years ago
- Tool useful to discover services behind unknown ports☆14May 20, 2021Updated 4 years ago
- node.js web scraper for roblox.com☆13Sep 17, 2014Updated 11 years ago
- Automate Recon process using Shell Scripting☆11Nov 26, 2021Updated 4 years ago
- ☆28Oct 30, 2016Updated 9 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Jun 9, 2019Updated 6 years ago
- Local File Inclusion (LFI) in FHEM 6.0 allows an attacker to include a file, it can lead to sensitive information disclosure.☆12Jan 20, 2021Updated 5 years ago
- best tool for hacking via windows cmd☆13Jan 4, 2019Updated 7 years ago
- Exploits for TRENDNet routers☆13Apr 21, 2020Updated 5 years ago
- Tutorials and Things to Do while Hunting Vulnerability.☆10May 15, 2025Updated 9 months ago
- API scraping from the metmuseum website☆36Feb 4, 2019Updated 7 years ago
- Fully-featured spear-phishing toolkit - sample docker setup (Linux-compatible)☆13Jan 12, 2025Updated last year
- NSA tool hacking☆15May 20, 2018Updated 7 years ago
- NO LONGER MAINTAINED. Read the README for more info.☆11May 20, 2018Updated 7 years ago
- A simple tool to check subdomains for clickjacking attack.☆12Mar 30, 2021Updated 4 years ago
- Registry Based Artifact Collection and Correlation☆10Aug 18, 2015Updated 10 years ago