mzeyong / shadowbrokerLinks
☆82Updated 5 years ago
Alternatives and similar repositories for shadowbroker
Users that are interested in shadowbroker are comparing it to the libraries listed below
Sorting:
- TinySHell port to SCTP☆125Updated 12 years ago
- Yet Another Web Spider☆71Updated 8 years ago
- An anti-ARP-spoofing application software that use active and passive scanning methods to detect and remove any ARP-spoofer from the netw…☆171Updated 5 years ago
- Encoded Reverse Shell Generator With Techniques To Bypass AV's☆146Updated 5 years ago
- This is a Metasploit module which exploits CVE-2017-11882 using the POC released here : https://embedi.com/blog/skeleton-closet-ms-office…☆97Updated 8 years ago
- Proof of Concept exploit for CVE-2017-8570☆184Updated 7 years ago
- CVE-2017-11882 Exploit accepts over 17k bytes long command/code in maximum.☆330Updated 8 years ago
- Terminal Service (RDP) Security Editor☆47Updated 8 years ago
- PoC for CVE-2018-0802 And CVE-2017-11882☆168Updated 7 years ago
- CVE-2018-8174 - VBScript memory corruption exploit.☆168Updated 7 years ago
- ☆68Updated 8 years ago
- GhostTunnel is a covert backdoor transmission method that can be used in an isolated environment.☆336Updated 6 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆173Updated 8 years ago
- MS17-010 exploits, payloads, and scanners☆94Updated 8 years ago
- Green-hat-suite is a tool to generate meterpreter/shell which could evade antivirus.☆130Updated 7 years ago
- CVE20178570☆95Updated 8 years ago
- Acunetix 0day RCE☆190Updated 9 years ago
- Avoidz tool to bypass most A.V softwares☆139Updated 8 years ago
- ppsx file generator for cve-2017-8570 (based on bhdresh/cve-2017-8570)☆67Updated 7 years ago
- APT34/OILRIG leak☆233Updated 6 years ago
- Tiny SHell - An open-source UNIX backdoor (I'm not the author!)☆614Updated 7 months ago
- exp of CVE-2018-15982☆181Updated 6 years ago
- A proof of concept for the RDP Inception Attack☆351Updated 8 years ago
- Toolkit for implant attack of IoT devices☆136Updated 7 years ago
- A Solution For Cross-Platform Obfuscated Commands Detection presented on CIS2019 China. 动静态Bash/CMD/PowerShell命令混淆检测框架 - CIS 2019大会☆165Updated 6 years ago
- ASTROID v 1.2 bypass most A.V softwares☆88Updated 8 years ago
- A webshell connection tool with customized WAF bypass payloads☆125Updated 7 years ago
- Post Exploitation agent which uses a browser to do C2 operations.☆103Updated 7 years ago
- rce exploit , made to work with pocsuite3☆122Updated 6 years ago
- Learn from Casey Smith @subTee☆240Updated 8 years ago