samsera / Equation_Group_Shadowbrokers
☆12Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for Equation_Group_Shadowbrokers
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 6 years ago
- Open Standard Vulnerability & Compliance Scanner☆41Updated 9 years ago
- A set of compiled application restriction bypasses☆29Updated 7 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Side Channel script☆25Updated last year
- JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool☆13Updated 6 years ago
- Working through Practical Malware Analysis from No Starch Press☆13Updated 7 years ago
- ☆12Updated 7 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 5 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Updated 7 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆31Updated 9 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 6 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 9 years ago
- Short little AV Test to check Detection Rates☆22Updated 3 years ago
- DPE - Default Password Enumeration☆32Updated 11 years ago
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆21Updated 6 years ago
- Gmail Knocker☆21Updated 7 years ago
- A tool for fuzzing for ports that allow outgoing connections☆20Updated 6 years ago
- DNS Botnet Server and Client☆35Updated 5 years ago
- Bash script to automate the installation and buildouts of OpenVPN servers and clients.☆6Updated 11 years ago
- A Passive DNS backend and collector☆31Updated 2 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆40Updated 2 years ago
- Fingerprint a web app using local files as the fingerprint sources☆36Updated 7 years ago
- Reuploading the code she removed.☆14Updated 5 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- Reverse shell and rootkit☆19Updated 7 years ago
- My personal Automated Malware Analysis Sandboxes and Services☆22Updated 7 years ago
- Example of malicious codes for educational purpose, don't make shit with that☆28Updated 5 years ago
- ☆22Updated 3 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆24Updated 6 years ago