FUZZBUNCH - NSA security tools
☆81Apr 16, 2017Updated 8 years ago
Alternatives and similar repositories for FUZZBUNCH
Users that are interested in FUZZBUNCH are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Double pulsar tool of NSA leaked by SHADOW BROKERS☆15Jun 16, 2017Updated 8 years ago
- fuckNSA☆40Dec 5, 2013Updated 12 years ago
- networked status aggregator sees all☆14Apr 26, 2021Updated 4 years ago
- NSA finest tool☆989Apr 17, 2017Updated 8 years ago
- This device silently hunts its prey, swooping in to gather RFID cards.☆33Apr 20, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆14Sep 22, 2019Updated 6 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Mar 6, 2017Updated 9 years ago
- ☆56May 30, 2017Updated 8 years ago
- Remote printing by Windows print spooler API forwarding.☆16Aug 3, 2015Updated 10 years ago
- Protect your servers with a secret header☆29Jun 12, 2020Updated 5 years ago
- Math shit - Variadic vector and polygon math, statistical analysis etc☆13Aug 26, 2019Updated 6 years ago
- A security write-up about the Paypal API & data leakage☆25May 27, 2016Updated 9 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- SpyDork is a python dork generator.☆14Aug 1, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Lightweight FreeBSD rootkit for stealth persistence, process hiding, and system control.☆19Mar 2, 2020Updated 6 years ago
- 几个UAC Bypass的方法☆12Apr 13, 2018Updated 7 years ago
- NSA Playset implant for bridging airgaps without radio☆17Sep 28, 2015Updated 10 years ago
- Framework for obtaining all the credentials stored in vulnerable Netwave IP cameras. Can be used to break into IP cameras, use for resear…☆38Jan 24, 2020Updated 6 years ago
- Bitcoin full node as a C Programming Language library☆10Dec 3, 2025Updated 3 months ago
- CVE-2019-1064 Local Privilege Escalation Vulnerability☆11Jun 12, 2019Updated 6 years ago
- HackSys Extreme Vulnerable Driver - Various Windows 7 x86 Kernel Exploits☆21Jan 13, 2018Updated 8 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 7 years ago
- ☆36Oct 27, 2019Updated 6 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Bypassing User Account Control (UAC) using TpmInit.exe☆131Sep 26, 2016Updated 9 years ago
- Dynamic and extensible shell code generator with multiple output types which can be formatted in binary, hexadecimal, and the typical she…☆19May 1, 2020Updated 5 years ago
- ☆50Sep 11, 2019Updated 6 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- Playing around with token manipulation in C#.☆29Nov 6, 2019Updated 6 years ago
- CryptoJoker is an open source ransomware written in C# created for education purposes only.☆22Jul 8, 2017Updated 8 years ago
- ☆46Sep 28, 2017Updated 8 years ago
- Evil maid attacks are the biggest threat to full disk encryption, if you can't provide 100% physical security. It's not about locking you…☆11Sep 4, 2016Updated 9 years ago
- Telegram notification for metasploit sessions.☆13Nov 22, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Script to mass deauthenticate multiple wireless clients.☆12Jan 1, 2017Updated 9 years ago
- dump Leak username password & cheker☆16Jun 12, 2021Updated 4 years ago
- CVE-2018-8021 Proof-Of-Concept and Exploit☆106Dec 3, 2018Updated 7 years ago
- upstream for seccheck☆15Jun 11, 2018Updated 7 years ago
- 010 Editor template for ACE archive format & CVE-2018-2025[0-3]☆26Feb 22, 2019Updated 7 years ago
- ☆43Jul 2, 2018Updated 7 years ago
- GAUSS MALWARE Source [Striking similarities with Duqu, FlameR!, Fanny, StuxNet and more.] Source coming soon! + Binaries + Video show…☆18Aug 4, 2022Updated 3 years ago