wolf-project / NSA-TOOLS-SHADOW-BROKERS
Decrypted content of eqgrp-auction-file.tar.xz
☆69Updated 7 years ago
Alternatives and similar repositories for NSA-TOOLS-SHADOW-BROKERS:
Users that are interested in NSA-TOOLS-SHADOW-BROKERS are comparing it to the libraries listed below
- Create a fully undetectable backdoor with simple steps.☆73Updated 2 years ago
- OnlyRAT is the only RAT you'll ever need. We will be able to use this tool to remotely command and control windows computers.Once install…☆151Updated 3 months ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆58Updated 3 years ago
- 🚀 This is a collection of hacking🔥 and pentesting 🧐 scripts to help with enumeration, OSINT, exploitation and post exploitation autom…☆155Updated 10 months ago
- Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security resear…☆233Updated 3 years ago
- A list of different misc resources from the discord. PDF's, websites, tools, and everything else you could fathom. Here to aid in your go…☆54Updated 8 months ago
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆189Updated last year
- ☆120Updated 10 months ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆122Updated 2 years ago
- capNcook - a dark web exploration tool☆58Updated 9 months ago
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆204Updated last year
- Anonymously Reverse Shell over Tor Network using Hidden services without Portforwarding.☆444Updated last month
- capNcook - a dark web exploration tool☆92Updated 3 months ago
- Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare in your car…☆31Updated this week
- Command and Control (C2) server with backdoor acting as Remote Administration Trojan (RAT) written in Python3☆155Updated last year
- Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscat…☆173Updated 2 years ago
- Repo containing cracked red teaming tools.☆139Updated 6 months ago
- IoT Camera Reconnaissance and Live Viewer☆137Updated 6 months ago
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆74Updated last year
- 🔬Collection of malware, ransomware, RATs, botnets, stealers, etc.☆112Updated 3 years ago
- Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare as a hacker …☆264Updated last year
- Automated exploit scanner for cameras on the internet☆175Updated 10 months ago
- WikiLeaks Vault 7 CIA Hacking Tools☆46Updated 7 years ago
- A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse …☆88Updated last year
- Collection Of LolSec☆34Updated 5 years ago
- All the free ebooks I've found online about hacking and such. Everyone should have access to these.....☆12Updated 6 years ago
- ☆138Updated last year
- A Remote Administration Tool (RAT) for Windows written in C++ with a fancy C.L.I.☆56Updated last year
- Fairly Undetectable Linux Spyware☆16Updated last year
- This is a shell script that creates an SSH backdoor on an iPhone.☆218Updated 3 months ago