Archive of TheShadowBrokersLeak
☆40Sep 6, 2017Updated 8 years ago
Alternatives and similar repositories for TheShadowBrokersLeak
Users that are interested in TheShadowBrokersLeak are comparing it to the libraries listed below
Sorting:
- Archive of leaked Equation Group materials☆21Aug 17, 2016Updated 9 years ago
- UPDATED 2022 Flame malware sourcecode available !! Forked. I will later provide my sample of Flame, Duqu and Gauss.☆19Mar 4, 2024Updated 2 years ago
- This repository contains some tools that I have written in the past☆29Nov 11, 2023Updated 2 years ago
- ☆35Jan 13, 2026Updated last month
- 安卓远控,天线6.0 无限使用版☆11Sep 9, 2023Updated 2 years ago
- Code solutions for IOAI-type contests (NEOAI, Romanian Olympiad, Polish Olympiad, etc.)☆29Feb 21, 2026Updated 2 weeks ago
- A repository for a Deep Q-Learning approach to intrusion detection for networks cyber-attacks.☆10Sep 3, 2021Updated 4 years ago
- SPPNet: An Appoach For Real-Time Encrypted Traffic Classification Using Deep Learning☆10Aug 6, 2024Updated last year
- IDA Python scripts☆42Apr 11, 2025Updated 10 months ago
- Reference implementation of Curve25519 and Curve448 as specified in RFC7748☆10Jun 22, 2019Updated 6 years ago
- ☆12Dec 5, 2024Updated last year
- ☆22Aug 29, 2025Updated 6 months ago
- Social coding with Git and GitHub.☆18Mar 21, 2015Updated 10 years ago
- 计算概论大作业,Qt,猫捉老鼠小游戏☆12Jan 15, 2019Updated 7 years ago
- Identify QuasarRAT/AsyncRAT/DcRAT/VenomRAT servers through scanning☆13Apr 20, 2024Updated last year
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- 图片炫酷动画展示 在线演示https://hanruto.github.io/image-show/imageCss.html☆12Feb 18, 2017Updated 9 years ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- Some ELF Malwares☆10Mar 11, 2022Updated 3 years ago
- Poshito is a Windows C2 over Telegram☆21Oct 30, 2024Updated last year
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 8 months ago
- ☆10Nov 26, 2024Updated last year
- ☆10Aug 27, 2022Updated 3 years ago
- Identifying malicious/benign network traffic using classification methods.☆10Sep 27, 2022Updated 3 years ago
- 基于upx的SM4加密壳☆10May 12, 2023Updated 2 years ago
- An interactive ChatGPT-powered command line tool that generates commands using natural language. z-cli 是一个基于 ChatGPT 的交互式命令行工具,支持用户输入自然语言…☆12Apr 11, 2023Updated 2 years ago
- ☆11Feb 22, 2026Updated 2 weeks ago
- Various Crypter Project☆10Feb 26, 2014Updated 12 years ago
- Malware WinXPSP2.Cermalus Windows Kernel Virus☆14Aug 11, 2023Updated 2 years ago
- GNNs-Pytorch-Geometric-Examples☆10Jun 14, 2020Updated 5 years ago
- Security Notes☆11Oct 10, 2018Updated 7 years ago
- 用c++编写一个简易的c语言编译器☆10Dec 8, 2019Updated 6 years ago
- Discord bot using the cryptography toolkit of SkeletonKey☆12Nov 18, 2024Updated last year
- Offensive Assembly code snippets.☆13Jul 12, 2023Updated 2 years ago
- A tool to showcase the Therac-25 bugs☆12Jun 11, 2019Updated 6 years ago
- OpenRAN Gym website☆12Dec 11, 2025Updated 2 months ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- A PoC C2 implementation that uses Native Messaging API to execute direct commands in the OS☆17Nov 5, 2025Updated 4 months ago
- DUQU MALWARE SOURCE + BINARY + More coming☆12Feb 6, 2023Updated 3 years ago