wolf-project / NSA-TOOLS-SHADOW-BROKERSLinks
Decrypted content of eqgrp-auction-file.tar.xz
☆93Updated 8 years ago
Alternatives and similar repositories for NSA-TOOLS-SHADOW-BROKERS
Users that are interested in NSA-TOOLS-SHADOW-BROKERS are comparing it to the libraries listed below
Sorting:
- OnlyRAT is the only RAT you'll ever need. We will be able to use this tool to remotely command and control windows computers.Once install…☆167Updated 5 months ago
- Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security resear…☆268Updated 4 years ago
- Emagnet is a tool for find leaked databases with 97.1% accurate to grab mail + password together from pastebin leaks. Support for brute f…☆230Updated 2 years ago
- AV evading OSX Backdoor and Crypter Framework☆303Updated last week
- The LockBit builder files☆140Updated last year
- Anonymously Reverse Shell over Tor Network using Hidden services without Portforwarding.☆504Updated 10 months ago
- Create a fully undetectable backdoor with simple steps.☆76Updated 3 years ago
- Command and Control (C2) server with backdoor acting as Remote Administration Trojan (RAT) written in Python3☆169Updated 2 years ago
- Spearphishing tools, generate masqueraded pocket executable☆106Updated 2 years ago
- (Beta) RES0LUTI0N is a malware builder undetected by Windows Defender with an anti-VM coded in python and C#. It uses a triple layer rand…☆56Updated last year
- 🚀 This is a collection of hacking🔥 and pentesting 🧐 scripts to help with enumeration, OSINT, exploitation and post exploitation autom…☆178Updated last year
- Jarbou3 is rat tool coded in python with C&C which can accept multiple connections from clients☆27Updated last year
- It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography …☆412Updated 3 years ago
- XENA is an innovative C2 made fully in Go. With hacking automation features.☆372Updated 6 months ago
- ☆124Updated last year
- Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscat…☆190Updated 6 months ago
- Spoof Calls For Free - Unlimited Usage☆122Updated 3 years ago
- New Redline Leak☆129Updated 4 years ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆65Updated 4 years ago
- Malware attacks/techniques explained☆191Updated 4 months ago
- Windows Hacking FrameWork using Reverse Shell☆106Updated 7 months ago
- Here's samples of android/ios spyware named "Pegasus" made by the NSOGROUP☆185Updated 4 years ago
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆78Updated 2 years ago
- Repo containing cracked red teaming tools.☆199Updated this week
- Remote Administration tool for Windows Systems written in pure Python☆133Updated last year
- Python Based Crypter That Can Bypass Any Kinds Of Antivirus Products☆359Updated last month
- The Red Rabbit project is just what a hacker needs for everyday automation. Red Rabbit unlike most frameworks out there does not automate…☆195Updated 2 years ago
- C2 server to connect to a victim machine via reverse shell☆53Updated 3 years ago
- Here are +200 different rats some with source code☆127Updated 2 years ago
- A Remote Administration Tool (RAT) for Windows written in C++ with a fancy C.L.I.☆62Updated 2 years ago