wolf-project / NSA-TOOLS-SHADOW-BROKERSLinks
Decrypted content of eqgrp-auction-file.tar.xz
☆92Updated 8 years ago
Alternatives and similar repositories for NSA-TOOLS-SHADOW-BROKERS
Users that are interested in NSA-TOOLS-SHADOW-BROKERS are comparing it to the libraries listed below
Sorting:
- OnlyRAT is the only RAT you'll ever need. We will be able to use this tool to remotely command and control windows computers.Once install…☆166Updated 4 months ago
- Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security resear…☆264Updated 4 years ago
- 🚀 This is a collection of hacking🔥 and pentesting 🧐 scripts to help with enumeration, OSINT, exploitation and post exploitation autom…☆180Updated last year
- Emagnet is a tool for find leaked databases with 97.1% accurate to grab mail + password together from pastebin leaks. Support for brute f…☆228Updated 2 years ago
- AV evading OSX Backdoor and Crypter Framework☆292Updated 2 weeks ago
- A list of different misc resources from the discord. PDF's, websites, tools, and everything else you could fathom. Here to aid in your go…☆60Updated last year
- Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscat…☆188Updated 4 months ago
- The Red Rabbit project is just what a hacker needs for everyday automation. Red Rabbit unlike most frameworks out there does not automate…☆194Updated 2 years ago
- Jarbou3 is rat tool coded in python with C&C which can accept multiple connections from clients☆26Updated last year
- It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography …☆410Updated 3 years ago
- Command and Control (C2) server with backdoor acting as Remote Administration Trojan (RAT) written in Python3☆167Updated 2 years ago
- Create a fully undetectable backdoor with simple steps.☆76Updated 3 years ago
- Spoof Calls For Free - Unlimited Usage☆117Updated 3 years ago
- Here's samples of android/ios spyware named "Pegasus" made by the NSOGROUP☆173Updated 4 years ago
- The LockBit builder files☆135Updated last year
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆278Updated last year
- Spearphishing tools, generate masqueraded pocket executable☆105Updated 2 years ago
- (Beta) RES0LUTI0N is a malware builder undetected by Windows Defender with an anti-VM coded in python and C#. It uses a triple layer rand…☆54Updated last year
- stuxnet Source & Binaries. (+PLC ROOTKIT) ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! Includes: Source files, Binaries, PLC Sa…☆225Updated last year
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆64Updated 4 years ago
- Anonymously Reverse Shell over Tor Network using Hidden services without Portforwarding.☆499Updated 9 months ago
- Repo containing cracked red teaming tools.☆191Updated last month
- Windows Hacking FrameWork using Reverse Shell☆107Updated 6 months ago
- Remote Access Trojan collection.(260+ RAT-Builders!)☆252Updated 3 years ago
- Modular penetration testing platform that enables you to write, test, and execute exploit code.☆313Updated 9 months ago
- Collection Of LolSec☆37Updated 6 years ago
- A collection of malwares found on the internet.☆63Updated 2 years ago
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆198Updated 2 months ago
- Undetectable Keylogger that reports to Discord☆72Updated last year
- WikiLeaks Vault 7 CIA Hacking Tools☆48Updated 8 years ago