x0rz / EQGRPLinks
Decrypted content of eqgrp-auction-file.tar.xz
☆4,179Updated 8 years ago
Alternatives and similar repositories for EQGRP
Users that are interested in EQGRP are comparing it to the libraries listed below
Sorting:
- Decrypted content of odd.tar.xz.gpg, swift.tar.xz.gpg and windows.tar.xz.gpg☆1,955Updated 8 years ago
 - NSA finest tool☆984Updated 8 years ago
 - Dirty COW☆3,420Updated 6 years ago
 - DEPRECATED, bettercap developement moved here: https://github.com/bettercap/bettercap☆2,497Updated 7 years ago
 - A tool to dump the login password from the current linux user☆4,032Updated last month
 - Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,852Updated last year
 - Wannacry in-memory key recovery☆1,090Updated 8 years ago
 - 📡 A python program to create a fake AP and sniff data.☆1,684Updated 6 years ago
 - Patch PE, ELF, Mach-O binaries with shellcode new version in development, available only to sponsors☆3,413Updated 2 years ago
 - SSH man-in-the-middle tool☆1,723Updated 4 years ago
 - This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆3,263Updated 3 years ago
 - A python2 script for sweeping a network to find windows systems compromised with the DOUBLEPULSAR implant.☆1,028Updated 5 years ago
 - Zero-Day Code Injection and Persistence Technique☆1,247Updated 3 years ago
 - DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3☆3,137Updated 5 years ago
 - Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren…☆9,102Updated 2 years ago
 - NOT MY CODE! Zeus trojan horse - leaked in 2011, I am not the author. This repository is for study purposes only, do not message me about…☆1,520Updated 4 years ago
 - Exploitation Framework for Embedded Devices☆12,792Updated 4 months ago
 - ☆1,330Updated 2 years ago
 - Command line utility for searching and downloading exploits☆1,785Updated last month
 - The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb☆7,823Updated 2 years ago
 - Veil Evasion is no longer supported, use Veil 3.0!☆1,841Updated 4 years ago
 - Automated Mass Exploiter☆5,163Updated 2 years ago
 - An evil RAT (Remote Administration Tool) for macOS / OS X.☆2,379Updated 4 years ago
 - ☆3,455Updated 10 months ago
 - Module of Metasploit to exploit the vulnerability Eternalblue-Doublepulsar.☆1,133Updated 4 years ago
 - Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆6,403Updated 6 years ago
 - Mirror of Shadowbrokers release from https://steemit.com/shadowbrokers/@theshadowbrokers/lost-in-translation☆477Updated 8 years ago
 - Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,778Updated 5 years ago
 - Course materials for Malware Analysis by RPISEC☆3,956Updated 3 years ago
 - Printer Exploitation Toolkit - The tool that made dumpster diving obsolete.☆4,161Updated last year