wolf-project / NSA-TOOLS-SHADOW-BROKERSLinks
Decrypted content of eqgrp-auction-file.tar.xz
☆94Updated 8 years ago
Alternatives and similar repositories for NSA-TOOLS-SHADOW-BROKERS
Users that are interested in NSA-TOOLS-SHADOW-BROKERS are comparing it to the libraries listed below
Sorting:
- OnlyRAT is the only RAT you'll ever need. We will be able to use this tool to remotely command and control windows computers.Once install…☆169Updated 7 months ago
- 🚀 This is a collection of hacking🔥 and pentesting 🧐 scripts to help with enumeration, OSINT, exploitation and post exploitation autom…☆181Updated last year
- Here's samples of android/ios spyware named "Pegasus" made by the NSOGROUP☆204Updated 4 years ago
- The Red Rabbit project is just what a hacker needs for everyday automation. Red Rabbit unlike most frameworks out there does not automate…☆191Updated 2 years ago
- Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security resear…☆270Updated 4 years ago
- Malware attacks/techniques explained☆201Updated 6 months ago
- Command and Control (C2) server with backdoor acting as Remote Administration Trojan (RAT) written in Python3☆174Updated 2 years ago
- A Sophisticated, Automated, AI-Driven, State-Sponsored Cyber-Espionage/Counter-Espionage & Zero Click AI-Gen Supply Chain Attack Framewor…☆62Updated 8 months ago
- A list of different misc resources from the discord. PDF's, websites, tools, and everything else you could fathom. Here to aid in your go…☆63Updated last year
- KeyloggerScreenshot is an intelligent tool which logs keys, makes a Screenshot every 20 seconds, recordes the mouse click with x and y po…☆127Updated 2 months ago
- Jarbou3 is rat tool coded in python with C&C which can accept multiple connections from clients☆29Updated 2 years ago
- Emagnet is a tool for find leaked databases with 97.1% accurate to grab mail + password together from pastebin leaks. Support for brute f…☆231Updated 2 years ago
- Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscat…☆189Updated 8 months ago
- Spoof Calls For Free - Unlimited Usage☆129Updated 4 years ago
- Repo containing cracked red teaming tools.☆215Updated 2 months ago
- New Redline Leak☆131Updated 5 years ago
- Here are +200 different rats some with source code☆138Updated 2 years ago
- C2 server to connect to a victim machine via reverse shell☆54Updated 3 years ago
- The LockBit builder files☆142Updated last year
- AV evading cross platform Backdoor and Crypter Framework with a integrated lightweight webUI☆310Updated last month
- Remcos Professional Cracked By Alcatraz3222-Remote Administration Trojan-RAT☆121Updated last year
- A framework like a metasploit containg a variety of modules for pentesting or ethical hacking. This repo willl be updated and new modules…☆189Updated 7 months ago
- More Advanced and Powerful Scripts made for pen-testing. Here there are Vulnerability Scanners, ARP-Poisoners, Botnets, Phishing Scripts,…☆63Updated 2 years ago
- A computer programming AI bot in python django☆55Updated last year
- Google account phishing tool written in python using django☆105Updated last month
- A windows post exploitation tool that contains a lot of features for information gathering and more.☆46Updated 4 years ago
- A collection of malwares found on the internet.☆64Updated 2 years ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆69Updated 4 years ago
- stuxnet Source & Binaries. (+PLC ROOTKIT) ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! Includes: Source files, Binaries, PLC Sa…☆236Updated last year
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆281Updated last year