vaginessa / ShadowBrokers-NSA-MirrorLinks
https://steemit.com/shadowbrokers/@theshadowbrokers/lost-in-translation # Exploits - **EARLYSHOVEL** RedHat 7.0 - 7.1 Sendmail 8.11.x exploit - **EBBISLAND (EBBSHAVE)** root RCE via RPC XDR overflow in Solaris 6, 7, 8, 9 & 10 (possibly newer) both SPARC and x86. - **ECHOWRECKER** remote Samba 3.0.x Linux exploit. - **EASYBEE** appears to be …
☆13Updated 8 years ago
Alternatives and similar repositories for ShadowBrokers-NSA-Mirror
Users that are interested in ShadowBrokers-NSA-Mirror are comparing it to the libraries listed below
Sorting:
- Hacking Tools For All Debian-based OS☆50Updated 7 years ago
- FUD Android Payload and Listener☆21Updated 7 years ago
- Free tools for mobile testing.☆39Updated 3 years ago
- Crackhash is a tool that try to crack different types of hashes using free online services.☆26Updated 6 years ago
- A Ruby script that takes in IPs and returns Country, State, and City☆42Updated 3 years ago
- GSM hacking tools and scripts☆57Updated 5 years ago
- local trading of BNB and Meme Rush tokens on Binance Smart Chain☆27Updated this week
- aircrack-ng gui 2019☆20Updated 7 years ago
- Multi facebook Cracking With Random Numbercloning☆19Updated last year
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆17Updated 4 years ago
- simple script to pwn android phone with physical access☆27Updated 7 years ago
- Run you Localhost Server☆27Updated last year
- Blackvenom is a python based Script. Blckvenom is an automated tool that can generate payload using metasploit. You can generate payload …☆33Updated 3 years ago
- pen testing scripts☆12Updated 4 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 3 years ago
- Windows Remote Administration Tool (RAT)☆33Updated 6 years ago
- Search exploits in multiple exploit databases!☆11Updated 9 years ago
- !!!WORLD'S 🌍 #1🥇 TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most to…☆47Updated 3 years ago
- FUD Win32 Keylogger and Reverse Shell (cmd.exe)☆19Updated 3 years ago
- Official Black Hat Arsenal Security Tools Repository☆13Updated 8 years ago
- Silently logs and E-mails all incoming/outgoing calls and text messages while doubling up as a flashlight app. The app also has the abili…☆23Updated 4 years ago
- Android-PIN-Bruteforce☆17Updated 4 years ago
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrator…☆15Updated 6 years ago
- An exploit for an XSS and RCE vulnerability in the GoAhead webserver for embedded devices.☆21Updated 4 years ago
- ☆20Updated 4 years ago
- Small social engineering tool written in python2☆20Updated last year
- Remote Administration Tool for Windows☆18Updated 10 years ago
- A program that does Deauthentication Attack on every nearby wireless device☆31Updated 6 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆58Updated 8 years ago
- Look for a backdoor shell on the website☆14Updated 7 years ago