FUZZBUNCH - NSA security tools
☆82Apr 16, 2017Updated 9 years ago
Alternatives and similar repositories for FUZZBUNCH
Users that are interested in FUZZBUNCH are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Double pulsar tool of NSA leaked by SHADOW BROKERS☆15Jun 16, 2017Updated 8 years ago
- fuckNSA☆40Dec 5, 2013Updated 12 years ago
- networked status aggregator sees all☆14Apr 26, 2021Updated 5 years ago
- NSA finest tool☆992Apr 17, 2017Updated 9 years ago
- This device silently hunts its prey, swooping in to gather RFID cards.☆33Apr 20, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆14Sep 22, 2019Updated 6 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Mar 6, 2017Updated 9 years ago
- ☆56May 30, 2017Updated 8 years ago
- Remote printing by Windows print spooler API forwarding.☆15Aug 3, 2015Updated 10 years ago
- Math shit - Variadic vector and polygon math, statistical analysis etc☆13Aug 26, 2019Updated 6 years ago
- Metasploit modules in testing☆14Jul 21, 2019Updated 6 years ago
- A security write-up about the Paypal API & data leakage☆25May 27, 2016Updated 9 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- SpyDork is a python dork generator.☆14Aug 1, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Lightweight FreeBSD rootkit for stealth persistence, process hiding, and system control.☆18Mar 2, 2020Updated 6 years ago
- 几个UAC Bypass的方法☆12Apr 13, 2018Updated 8 years ago
- NSA Playset implant for bridging airgaps without radio☆17Sep 28, 2015Updated 10 years ago
- Framework for obtaining all the credentials stored in vulnerable Netwave IP cameras. Can be used to break into IP cameras, use for resear…☆39Jan 24, 2020Updated 6 years ago
- CVE-2019-1064 Local Privilege Escalation Vulnerability☆11Jun 12, 2019Updated 6 years ago
- HackSys Extreme Vulnerable Driver - Various Windows 7 x86 Kernel Exploits☆21Jan 13, 2018Updated 8 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit using GDI -> Low Integrity to System☆15Mar 30, 2017Updated 9 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 7 years ago
- ☆36Oct 27, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Use to generate DLL through Visual Studio☆19Jul 24, 2017Updated 8 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆131Sep 26, 2016Updated 9 years ago
- Dynamic and extensible shell code generator with multiple output types which can be formatted in binary, hexadecimal, and the typical she…☆19May 1, 2020Updated 6 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- ☆50Sep 11, 2019Updated 6 years ago
- Playing around with token manipulation in C#.☆29Nov 6, 2019Updated 6 years ago
- ☆46Sep 28, 2017Updated 8 years ago
- Telegram notification for metasploit sessions.☆13Nov 22, 2018Updated 7 years ago
- Script to mass deauthenticate multiple wireless clients.☆12Jan 1, 2017Updated 9 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- CVE-2018-8021 Proof-Of-Concept and Exploit☆105Dec 3, 2018Updated 7 years ago
- Just another repository holding files of Shadow Brokers. Extracted myself.☆55Apr 9, 2017Updated 9 years ago
- 010 Editor template for ACE archive format & CVE-2018-2025[0-3]☆26Feb 22, 2019Updated 7 years ago
- ☆43Jul 2, 2018Updated 7 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago
- A first look at browser-based Cryptojacking☆16Jun 7, 2018Updated 7 years ago
- Simple decrypter for strings used in SamSam Ransomware samples.☆18Feb 21, 2020Updated 6 years ago