aaronjorbin / nsa-backdoorView external linksLinks
The NSA wants access to your all your data, might as well make it easier for them to access the backend of your WordPress install. When you save the NSA time, you save tax payers money.
☆27Nov 2, 2016Updated 9 years ago
Alternatives and similar repositories for nsa-backdoor
Users that are interested in nsa-backdoor are comparing it to the libraries listed below
Sorting:
- NSA's IIS 6.0 exploit that creates a remote backdoor.☆19Feb 12, 2019Updated 7 years ago
- NSA-Proof Secure P2P Chat client☆11Jul 15, 2015Updated 10 years ago
- ☆10Apr 2, 2022Updated 3 years ago
- Latest muhstik release (4.2.2)☆10Mar 25, 2014Updated 11 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆22May 30, 2015Updated 10 years ago
- ☆10Mar 29, 2022Updated 3 years ago
- ☆10Oct 1, 2016Updated 9 years ago
- Simple CLIENT side bypass for the Microsoft Defender for Cloud Apps Proxy☆15Apr 8, 2022Updated 3 years ago
- Double pulsar tool of NSA leaked by SHADOW BROKERS☆15Jun 16, 2017Updated 8 years ago
- No longer maintained. Timing attacks on a browsers cache to try to predict websites/subreddits that have been viewed☆13Mar 26, 2022Updated 3 years ago
- DNS Misconfiguration : S0x4 - Same Site Scripting Scanner☆15Jan 20, 2021Updated 5 years ago
- Bypass AntiVirus with Python and Metasploit using shellcode☆11Mar 25, 2016Updated 9 years ago
- Driver reverse engineering of the Russian Sandworm hacking group's BlackEnergy malware.☆19Apr 27, 2021Updated 4 years ago
- Tools for assisting the reverse engineering of Qakbot☆11Jul 21, 2021Updated 4 years ago
- Darknet botnet/worm aims to be a distributed anonymous P2P-based simple botnet written in Assembly☆37Aug 20, 2013Updated 12 years ago
- FETB : Take URL of File For Analysis using File + ExifTool + Binwalk Commands☆20Feb 2, 2021Updated 5 years ago
- ☆17Jul 26, 2019Updated 6 years ago
- ☆18Dec 27, 2019Updated 6 years ago
- A Botnet builder built on Elasticsearch and Kibana with the help of C++ and Python3☆22Jul 21, 2020Updated 5 years ago
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆21Dec 11, 2020Updated 5 years ago
- Intentionally Vulnerable Nodejs Application & APIs☆21Apr 9, 2022Updated 3 years ago
- A proof of concept to dump Django website's source code affected by NGINX's off-by-slash alias directive misconfiguration.☆24Dec 8, 2022Updated 3 years ago
- The Horrific Omnipotent Rootkit☆23Mar 17, 2017Updated 8 years ago
- FIREWALL EXPLOITS COPY OF NSA EQUATION GROUP SHADOW BROKERS☆20Sep 22, 2016Updated 9 years ago
- Eternalblue & DoublePulsar scanner☆26Jun 9, 2017Updated 8 years ago
- Dell Driver EoP (CVE-2021-21551)☆32Feb 24, 2022Updated 3 years ago
- A Cross Platform multifunctional (Windows/Linux/Mac) Remote Adminstration Tools.☆24Jan 1, 2021Updated 5 years ago
- JavaScript library for scroll effects that allows controlling the flow of the page navigation, overlaying the sections based on scrolling…☆24Aug 16, 2025Updated 5 months ago
- OTP-BYPASS-2022 Signaling System is an international telecommunication protocol standard that defines how the network elements in a publi…☆12Oct 10, 2022Updated 3 years ago
- Tool to find SMTP servers vulnerable to open relay☆83Feb 13, 2020Updated 6 years ago
- POC for CVE-2022-23648☆36Mar 29, 2022Updated 3 years ago
- ☆37Apr 24, 2022Updated 3 years ago
- Simple for traversing dom and staff☆10Jan 30, 2025Updated last year
- A jQuery plugin that display a button for scrolling the page to the top.☆14Sep 19, 2017Updated 8 years ago
- Install, uninstall and control remote and local windows services☆13Feb 4, 2013Updated 13 years ago
- Python Keylogger PortScanner BruteForce and basic hack tools.(new ones will come soon)☆18Mar 30, 2021Updated 4 years ago
- Tool useful to discover services behind unknown ports☆14May 20, 2021Updated 4 years ago
- Automate Recon process using Shell Scripting☆11Nov 26, 2021Updated 4 years ago
- AES Ransomware in batch☆11Jun 25, 2024Updated last year