mzeyong / shadowbrokerLinks
☆81Updated 5 years ago
Alternatives and similar repositories for shadowbroker
Users that are interested in shadowbroker are comparing it to the libraries listed below
Sorting:
- TinySHell port to SCTP☆126Updated 11 years ago
- Yet Another Web Spider☆71Updated 8 years ago
- An anti-ARP-spoofing application software that use active and passive scanning methods to detect and remove any ARP-spoofer from the netw…☆172Updated 4 years ago
- Terminal Service (RDP) Security Editor☆47Updated 8 years ago
- ☆68Updated 8 years ago
- This is a Metasploit module which exploits CVE-2017-11882 using the POC released here : https://embedi.com/blog/skeleton-closet-ms-office…☆99Updated 7 years ago
- Timer and Stay Resident☆35Updated 7 years ago
- PoC for CVE-2018-0802 And CVE-2017-11882☆167Updated 7 years ago
- A webshell connection tool with customized WAF bypass payloads☆125Updated 6 years ago
- Proof of Concept exploit for CVE-2017-8570☆186Updated 7 years ago
- Automates credential skimming from service accounts in Windows Registry☆77Updated 4 years ago
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆107Updated 7 years ago
- A weaponized version of CVE-2018-9206☆62Updated 6 years ago
- A Solution For Cross-Platform Obfuscated Commands Detection presented on CIS2019 China. 动静态Bash/CMD/PowerShell命令混淆检测框架 - CIS 2019大会☆165Updated 5 years ago
- CVE20178570☆96Updated 8 years ago
- A little post-exploit tool that carefully clean *NIX access logs☆119Updated 7 years ago
- MS17-010 exploits, payloads, and scanners☆94Updated 8 years ago
- Encoded Reverse Shell Generator With Techniques To Bypass AV's☆146Updated 5 years ago
- ppsx file generator for cve-2017-8570 (based on bhdresh/cve-2017-8570)☆67Updated 7 years ago
- CVE-2018-8174 - VBScript memory corruption exploit.☆167Updated 7 years ago
- MS17-010 multithreading scanner written in python.☆75Updated 8 years ago
- A Win7 RDP exploit☆111Updated 6 years ago
- Post Exploitation agent which uses a browser to do C2 operations.☆102Updated 7 years ago
- Toolkit for implant attack of IoT devices☆135Updated 6 years ago
- A generator to weaponize Macro payloads that can evade EMET and utilises native VB migration.☆118Updated 6 years ago
- Only Hitting PoC [Tested on Windows Server 2008 r2]☆128Updated 6 years ago
- WebLogic Exploit☆142Updated 7 years ago
- Dirbuster plugin for Burp Suite☆71Updated 8 years ago
- Working Python test and PoC for CVE-2018-11776, includes Docker lab☆125Updated 6 years ago
- ☆164Updated 7 years ago