4/5 of the leaks provided by TheShadowBrokers containing content from The Equation Group.
☆15Jul 11, 2017Updated 8 years ago
Alternatives and similar repositories for EquationGroupLeaks
Users that are interested in EquationGroupLeaks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Apr 14, 2017Updated 9 years ago
- Njrat horror source release☆12Oct 19, 2022Updated 3 years ago
- Collection of various malware techniques aimed at Windows through MinGW☆16Aug 24, 2024Updated last year
- Decrypt Nanocore RAT configuration☆10Mar 11, 2017Updated 9 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 10 months ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A Stuxnet clone made in Python for a research project☆14Sep 9, 2019Updated 6 years ago
- KrackPlus seeks to handle dependencies and parse the output from two scripts made by Mathy Vanhoef; with KrackPlus users can scan their d…☆13Dec 8, 2018Updated 7 years ago
- XOrCryptEx lightweight C Utility/Algorithm☆13Mar 3, 2022Updated 4 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆26Jan 29, 2018Updated 8 years ago
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.☆11Nov 22, 2019Updated 6 years ago
- Incident Response Collections☆11Jul 24, 2018Updated 7 years ago
- Zerokit shared code☆17Mar 28, 2019Updated 7 years ago
- DUQU MALWARE SOURCE + BINARY + More coming☆14Feb 6, 2023Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Mirror of Shadowbrokers release from https://steemit.com/shadowbrokers/@theshadowbrokers/lost-in-translation☆513Apr 14, 2017Updated 9 years ago
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Feb 10, 2015Updated 11 years ago
- ☆23Mar 14, 2025Updated last year
- A rework of CMLuaUtil AutoElevated☆30Nov 6, 2022Updated 3 years ago
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 10 months ago
- an iSCSI demo driver for Windows☆12Sep 21, 2015Updated 10 years ago
- [WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)☆13Jun 12, 2017Updated 8 years ago
- Tool for injecting (smali) services to APK files☆44Jan 1, 2023Updated 3 years ago
- ☆21Sep 9, 2025Updated 7 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Malware WinXPSP2.Cermalus Windows Kernel Virus☆14Aug 11, 2023Updated 2 years ago
- CEH v13 i-labs , CEH v13 Engage Answers☆42Jul 5, 2025Updated 10 months ago
- SecretFinder - A python script for find sensitive data (apikeys, accesstoken,jwt,..) and search anything on javascript files☆11Mar 29, 2021Updated 5 years ago
- A simple DLL injection protection driver.☆12Dec 21, 2020Updated 5 years ago
- ☆34Sep 21, 2024Updated last year
- Redteam, Pentest, APT's, Blogs, Talks, Slides links and notes☆27May 25, 2022Updated 3 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆11Aug 6, 2018Updated 7 years ago
- A tool to showcase the Therac-25 bugs☆12Jun 11, 2019Updated 6 years ago
- ☆13Feb 16, 2016Updated 10 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- agent.btz download MALWARE BINARY PROVIDED + POC video☆23Jul 11, 2021Updated 4 years ago
- Remote Assistance Volatile Environment LPE☆15Jun 28, 2025Updated 10 months ago
- kali linux tutorials and commands for ethical hackers and penetration testing☆10Jul 6, 2025Updated 9 months ago
- 2022 Updated Kernelmode-Code☆32Mar 23, 2024Updated 2 years ago
- Files that dictate the tauOS OSTree - Archived in-place☆11Jun 28, 2023Updated 2 years ago
- A LKM (Loadable Kernel Module) to execute a command as root; I include a example of using netcat and a compiled(with source and steps on…☆16Oct 8, 2024Updated last year
- Short little AV Test to check Detection Rates☆20Jan 28, 2021Updated 5 years ago