wolf-project / NSA-TOOLS-SHADOW-BROKERSLinks
Decrypted content of eqgrp-auction-file.tar.xz
☆94Updated 8 years ago
Alternatives and similar repositories for NSA-TOOLS-SHADOW-BROKERS
Users that are interested in NSA-TOOLS-SHADOW-BROKERS are comparing it to the libraries listed below
Sorting:
- OnlyRAT is the only RAT you'll ever need. We will be able to use this tool to remotely command and control windows computers.Once install…☆169Updated 7 months ago
- Here's samples of android/ios spyware named "Pegasus" made by the NSOGROUP☆204Updated 4 years ago
- Emagnet is a tool for find leaked databases with 97.1% accurate to grab mail + password together from pastebin leaks. Support for brute f…☆231Updated 2 years ago
- Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security resear…☆270Updated 4 years ago
- 🚀 This is a collection of hacking🔥 and pentesting 🧐 scripts to help with enumeration, OSINT, exploitation and post exploitation autom…☆181Updated last year
- AV evading cross platform Backdoor and Crypter Framework with a integrated lightweight webUI☆310Updated last month
- Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscat…☆189Updated 8 months ago
- The LockBit builder files☆142Updated last year
- Anonymously Reverse Shell over Tor Network using Hidden services without Portforwarding.☆516Updated last year
- A collection of malwares found on the internet.☆64Updated 2 years ago
- A large repository of malware samples with 2500+ malware samples & source codes for a variety of platforms by Cryptware Apps.☆514Updated last year
- A list of different misc resources from the discord. PDF's, websites, tools, and everything else you could fathom. Here to aid in your go…☆63Updated last year
- The Red Rabbit project is just what a hacker needs for everyday automation. Red Rabbit unlike most frameworks out there does not automate…☆191Updated 2 years ago
- Jarbou3 is rat tool coded in python with C&C which can accept multiple connections from clients☆29Updated 2 years ago
- It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography …☆414Updated 3 years ago
- KeyloggerScreenshot is an intelligent tool which logs keys, makes a Screenshot every 20 seconds, recordes the mouse click with x and y po…☆126Updated 2 months ago
- A Sophisticated, Automated, AI-Driven, State-Sponsored Cyber-Espionage/Counter-Espionage & Zero Click AI-Gen Supply Chain Attack Framewor…☆62Updated 8 months ago
- Command and Control (C2) server with backdoor acting as Remote Administration Trojan (RAT) written in Python3☆174Updated 2 years ago
- DarkComet RAT(RemoteAdministrationTool) 5.3.1☆231Updated 2 years ago
- Remcos Professional Cracked By Alcatraz3222-Remote Administration Trojan-RAT☆121Updated last year
- stuxnet Source & Binaries. (+PLC ROOTKIT) ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! Includes: Source files, Binaries, PLC Sa…☆236Updated last year
- VERY SOON☆184Updated last year
- New Redline Leak☆131Updated 5 years ago
- Spoof Calls For Free - Unlimited Usage☆129Updated 4 years ago
- Stego is an open-source and free steganography tool that lets you hide your secret message in an image or audio file. You will not notice…☆148Updated 4 years ago
- This will encrypt 🤐 your files using AES-256-CTR, then RSA-4096😵💫to secure the exchange with the server, or can use the Tor SOCKS5 Pr…☆80Updated 2 years ago
- WikiLeaks Vault 7 CIA Hacking Tools☆50Updated 8 years ago
- XENA is an innovative C2 made fully in Go. With hacking automation features.☆377Updated 8 months ago
- Google account phishing tool written in python using django☆105Updated last month
- (Beta) RES0LUTI0N is a malware builder undetected by Windows Defender with an anti-VM coded in python and C#. It uses a triple layer rand…☆58Updated last year