ajaygowtham / NSA_EQUATION_GROUP_LEAKLinks
FIREWALL EXPLOITS COPY OF NSA EQUATION GROUP SHADOW BROKERS
☆19Updated 9 years ago
Alternatives and similar repositories for NSA_EQUATION_GROUP_LEAK
Users that are interested in NSA_EQUATION_GROUP_LEAK are comparing it to the libraries listed below
Sorting:
- Free sampling of files from the purported Equation Group hack.☆11Updated 8 years ago
- Darknet botnet/worm aims to be a distributed anonymous P2P-based simple botnet written in Assembly☆37Updated 12 years ago
- Just another repository holding files of Shadow Brokers. Extracted myself.☆50Updated 8 years ago
- trolo - an easy to use script for generating Payloads that bypasses antivirus☆51Updated 8 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆22Updated 10 years ago
- MSF database code, gemified☆54Updated 5 months ago
- Simple security surveillance script for linux distributions.☆60Updated 8 years ago
- MCD's Black Jack is a password cracking tool for linux that cracks md5, sha1, sha256 and sha512 hashes. It uses the Dictionary bruteforci…☆20Updated 5 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆47Updated 8 years ago
- ☆12Updated 8 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆50Updated 6 years ago
- Anontwi is a tool for OAuth2 applications (such as: GNUSocial, Twitter) that provides different layers of encryption, privacy methods and…☆32Updated 10 years ago
- ARP poison and sniff with DNS spoofing, urlsnarf, driftnet, ferret, dsniff, sslstrip and tcpdump☆26Updated 10 years ago
- PoC Android smart phone botnet☆78Updated 13 years ago
- A fast and advanced ransomware PoC☆60Updated 10 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Updated 8 years ago
- zeus-style banking trojan☆14Updated 8 years ago
- Inject beef hooks into HTTP traffic and track hooked systems from cmdline☆125Updated 10 years ago
- Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android) Remote Administration Tool with an embedded Python interpreter.☆15Updated 9 years ago
- Dependencies for Veil 3☆17Updated 8 years ago
- This version touches disk for registry persistence.☆26Updated 10 years ago
- A ctypes powered python keylogger.☆108Updated 5 years ago
- w3af packaging for Kali distribution☆26Updated 9 years ago
- Papers about known hacking, security, hardware, software, computer, network and other ressources.☆78Updated 6 years ago
- SockStress DoS (Denial of Service) exploit written in Python |☆38Updated 10 years ago
- Samsung TV Denial of Service (DoS) Attack☆37Updated 8 years ago
- Kill Any Antivirus Using Python For Windows Users .☆47Updated 9 years ago
- ☆12Updated 8 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's Don't Forget Your Base release. Contains Equation group's collection of tools primar…☆16Updated 7 years ago
- Post-Exploitation Framework☆78Updated 8 years ago