ajaygowtham / NSA_EQUATION_GROUP_LEAK
FIREWALL EXPLOITS COPY OF NSA EQUATION GROUP SHADOW BROKERS
☆17Updated 7 years ago
Related projects: ⓘ
- Just another repository holding files of Shadow Brokers. Extracted myself.☆30Updated 7 years ago
- MSF database code, gemified☆52Updated 3 months ago
- w3af packaging for Kali distribution☆24Updated 8 years ago
- Darknet botnet/worm aims to be a distributed anonymous P2P-based simple botnet written in Assembly☆33Updated 11 years ago
- trolo - an easy to use script for generating Payloads that bypasses antivirus☆48Updated 7 years ago
- Shodan.io Command Line Interface☆44Updated 3 years ago
- Simple security surveillance script for linux distributions.☆56Updated 7 years ago
- A remote msfconsole written in Python 2.7 to connect to the msfrcpd server of metasploit. This tool gives you the ability to load modules…☆55Updated 5 years ago
- A cross-platform Java based Facebook social engineering framework, sends friend requests to a list of Facebook profiles, and polls for th…☆9Updated 11 years ago
- Inject beef hooks into HTTP traffic and track hooked systems from cmdline☆120Updated 9 years ago
- zeus-style banking trojan☆14Updated 7 years ago
- This is a big smash up of a lot of various tools I have made in the past along with some new ones. It includes a array of tools for helpi…☆84Updated 10 years ago
- Attacking WPA/WPA encrypted access point without client.☆46Updated 10 years ago
- ☆13Updated this week
- Metakitty, The Metasploit Resource Portal☆17Updated 6 months ago
- A review of the security testing tools publicly available through the Kali Linux Repos.☆21Updated 10 years ago
- ☆23Updated this week
- A copy of articles published at Peerlyst☆35Updated 7 years ago
- ssh session type for metasploit☆97Updated last year
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆30Updated 12 years ago
- Generate customized and undetectable exploits for Metasploit.☆22Updated 7 years ago
- ☆12Updated 7 years ago
- ☆52Updated 7 years ago
- ElevenPaths EternalBlue Metasploit module - works better than Rapid 7☆56Updated 7 years ago
- Transferring Backdoor Payload by BSSID and Wireless traffic☆56Updated last year
- Post-Exploitation Framework☆74Updated 7 years ago
- Download exploits from exploit-db.com☆43Updated 9 years ago
- A Kali Linux Tool to assist with security audits and pentesting. Lots of wrappers for commonly used tools to help extend their usefulness…☆29Updated 11 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 8 years ago
- Metasploit Framework☆26Updated 10 years ago