nneonneo / eqgrp-free-fileView external linksLinks
Free sampling of files from the purported Equation Group hack.
☆196Aug 16, 2016Updated 9 years ago
Alternatives and similar repositories for eqgrp-free-file
Users that are interested in eqgrp-free-file are comparing it to the libraries listed below
Sorting:
- Public repository for improvements to the EXTRABACON exploit☆163Nov 2, 2016Updated 9 years ago
- Application Security library☆11Nov 6, 2012Updated 13 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆26Jan 29, 2018Updated 8 years ago
- Decrypted content of odd.tar.xz.gpg, swift.tar.xz.gpg and windows.tar.xz.gpg☆1,979Apr 14, 2017Updated 8 years ago
- Decrypted content of eqgrp-auction-file.tar.xz☆4,198May 24, 2017Updated 8 years ago
- Tools for communicating with Intel Management Engine through MEI (HECI)☆13Jul 27, 2017Updated 8 years ago
- EQGRP-Free-Files here.,☆46Aug 16, 2016Updated 9 years ago
- eSentire additions to the nmap network scanner☆14Mar 29, 2016Updated 9 years ago
- LPE exploits for Secret Net and Secret Net Studio☆52Mar 1, 2016Updated 9 years ago
- system scanner☆222Apr 6, 2022Updated 3 years ago
- Rainmap Lite - Responsive web based interface that allows users to launch Nmap scans from their mobiles/tablets/web browsers!☆232Dec 11, 2020Updated 5 years ago
- Source for many challenges from DEF CON 21 CTF Qualifier☆39Apr 6, 2014Updated 11 years ago
- Passive DHCP analyzer with OS fingerprinting on the LAN through DHCP☆13Nov 16, 2017Updated 8 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Aug 15, 2016Updated 9 years ago
- ☆48Nov 28, 2016Updated 9 years ago
- FIREWALL EXPLOITS COPY OF NSA EQUATION GROUP SHADOW BROKERS☆20Sep 22, 2016Updated 9 years ago
- A database of published security advisories reported by the Programa STIC Team at Fundación Sadosky☆87Feb 22, 2017Updated 8 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Mar 12, 2014Updated 11 years ago
- a passive scanner based on Mitmproxy and Arachni☆109Aug 17, 2017Updated 8 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Jul 8, 2015Updated 10 years ago
- little scripts created during my time as a pentetration tester☆31Jun 17, 2012Updated 13 years ago
- Cross-platform radio signal visualizer for HackRF & other SDR platforms.☆17Oct 1, 2020Updated 5 years ago
- Tools for NTDS.dit☆17Apr 26, 2018Updated 7 years ago
- Guides, Tools, Tips and such for working with the Shadow Brokers dumps☆237Dec 6, 2018Updated 7 years ago
- 同程巡风项目Docker镜像版☆24Dec 22, 2016Updated 9 years ago
- Every document published from the Snowden archive☆73Apr 7, 2015Updated 10 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆16May 3, 2014Updated 11 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Jul 27, 2017Updated 8 years ago
- A Github organization reconnaissance tool.☆218May 22, 2023Updated 2 years ago
- Local UNIX PrivEsc Aggregation☆244Apr 9, 2016Updated 9 years ago
- A curated list of Chinese websites and personal blogs about ethical hacking and pentesting☆112Oct 8, 2020Updated 5 years ago
- A library for efficient interception of established TCP connections☆20Oct 12, 2015Updated 10 years ago
- DNS Enumeration and Reconnaissance Tool☆36Jan 19, 2016Updated 10 years ago
- Proof of Concept code for CVE-2016-5696☆102Aug 24, 2016Updated 9 years ago
- My UEFI security talk on ZeroNights 2015☆58Dec 13, 2015Updated 10 years ago
- Simple test for the May 2016 OpenSSL padding oracle (CVE-2016-2107)☆194Mar 10, 2019Updated 6 years ago
- BrundleFuzz is a distributed fuzzer for Windows and Linux using dynamic binary instrumentation.☆82Sep 10, 2016Updated 9 years ago
- Python SDK to access the vulnerability database☆22Sep 5, 2019Updated 6 years ago
- pykd script to dynamically find vtables on heap (windows x86/x64)☆25Oct 14, 2014Updated 11 years ago