4/5 of the leaks provided by TheShadowBrokers containing content from The Equation Group.
☆15Jul 11, 2017Updated 8 years ago
Alternatives and similar repositories for EquationGroupLeaks
Users that are interested in EquationGroupLeaks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Apr 14, 2017Updated 9 years ago
- [+] nls_933w.dll + [+] WIN32M.SYS MALWARE- ONLY FOR ACADEMICAL RESEARCH PURPOSES!☆11Sep 20, 2025Updated 6 months ago
- Collection of various malware techniques aimed at Windows through MinGW☆16Aug 24, 2024Updated last year
- Decrypt Nanocore RAT configuration☆10Mar 11, 2017Updated 9 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 9 months ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- XOrCryptEx lightweight C Utility/Algorithm☆13Mar 3, 2022Updated 4 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆26Jan 29, 2018Updated 8 years ago
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- Incident Response Collections☆11Jul 24, 2018Updated 7 years ago
- FAUCET is an OpenFlow controller for multi table OpenFlow 1.3 switches, that implements layer 2 switching, VLANs, ACLs, and layer 3 IPv4 …☆14Nov 18, 2019Updated 6 years ago
- Mirror of Shadowbrokers release from https://steemit.com/shadowbrokers/@theshadowbrokers/lost-in-translation☆507Apr 14, 2017Updated 9 years ago
- an iSCSI demo driver for Windows☆12Sep 21, 2015Updated 10 years ago
- [WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)☆13Jun 12, 2017Updated 8 years ago
- SecretFinder - A python script for find sensitive data (apikeys, accesstoken,jwt,..) and search anything on javascript files☆11Mar 29, 2021Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A simple DLL injection protection driver.☆12Dec 21, 2020Updated 5 years ago
- Enter Product Key Volatile Environment LPE☆13Jun 28, 2025Updated 9 months ago
- WizardsToolkit is a secure C library offering cross-platform cryptography, hashing, authentication, and data integrity tools. It supports…☆16Feb 16, 2026Updated last month
- ☆33Sep 21, 2024Updated last year
- Redteam, Pentest, APT's, Blogs, Talks, Slides links and notes☆27May 25, 2022Updated 3 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆11Aug 6, 2018Updated 7 years ago
- A tool to showcase the Therac-25 bugs☆12Jun 11, 2019Updated 6 years ago
- simple user-mode Rootkit☆109Oct 24, 2022Updated 3 years ago
- ☆13Feb 16, 2016Updated 10 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Remote Assistance Volatile Environment LPE☆15Jun 28, 2025Updated 9 months ago
- kali linux tutorials and commands for ethical hackers and penetration testing☆10Jul 6, 2025Updated 9 months ago
- Files that dictate the tauOS OSTree☆11Jun 28, 2023Updated 2 years ago
- Windows Auto Post Exploitation - For ReD Team☆15Jul 21, 2019Updated 6 years ago
- NSA Hacking Tool Recreation UnitedRake☆13Jul 11, 2019Updated 6 years ago
- x86 Disassembly in pure java☆11Apr 12, 2022Updated 4 years ago
- Project details, downloads and supported device list for OpenRazer☆15Apr 3, 2026Updated last week
- Public Advisories for Security Vulnerabilities.☆25Mar 14, 2015Updated 11 years ago
- IDA plugin for UEFI firmware analysis and reverse engineering automation☆14May 14, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Daily archiver & triage issue creator for new releases of CISA's Known Exploited Vulnerabilities list☆39Updated this week
- TaskMgr Volatile Environment LPE☆16Jun 28, 2025Updated 9 months ago
- Public Nullsecurity Website☆14Jan 2, 2026Updated 3 months ago
- TUI file explorer based on PowerShell and fzf☆10Aug 4, 2025Updated 8 months ago
- Cobalt Strike Beacon Object File to to change the user's desktop wallpaper☆17Sep 15, 2023Updated 2 years ago
- Experiments on C/C++ Exploits☆22Jun 30, 2020Updated 5 years ago
- LOJAX ROOTKIT (UEFI) +PDF Included[x]☆37Mar 9, 2023Updated 3 years ago