samsera / Equation_Group_Shadowbrokers
☆12Updated 8 years ago
Alternatives and similar repositories for Equation_Group_Shadowbrokers
Users that are interested in Equation_Group_Shadowbrokers are comparing it to the libraries listed below
Sorting:
- Open Standard Vulnerability & Compliance Scanner☆43Updated 9 years ago
- Side Channel script☆25Updated 2 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆22Updated 7 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 8 years ago
- DPE - Default Password Enumeration☆34Updated 11 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Updated 7 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- An example command dropper in rust.☆13Updated 6 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆31Updated 10 years ago
- Reuploading the code she removed.☆14Updated 5 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆56Updated 7 years ago
- Wardriving ekoparty☆15Updated 7 years ago
- Gophish Python cli to perform huge phishing campaigns☆40Updated 6 years ago
- Cyberdelia, a Collection of Command and Control frameworks☆64Updated 5 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 5 months ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- A collection of curated Java Deserialization Exploits☆10Updated 6 years ago
- Generate customized and undetectable exploits for Metasploit.☆24Updated 7 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆45Updated 8 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆24Updated 6 years ago
- (Unofficial) Python API for cybercrime-tracker.net☆37Updated 7 years ago
- ☆24Updated last year
- Vocabulary Scraper script used in FLARE's analysis of Russian-language Carbanak source code☆37Updated 6 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- Fuzzer for finding Open Mail Relays☆14Updated 4 years ago