• Stars
    star
    11
  • Rank 1,694,829 (Top 34 %)
  • Language Roff
  • Created almost 7 years ago
  • Updated about 2 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

The ORIGINAL decrypted copies of the Shadow Broker's Trick Or Treat release. Contains a list of servers, supposedly compromised by Equation Group as well as references to seven supposedly undisclosed tools (DEWDROP, INCISION, JACKLADDER, ORANGUTAN, PATCHICILLIN, RETICULUM, SIDETRACK AND STOCSURGEON) also used by the threat actor.

More Repositories

1

Memcrashed-DDoS-Exploit

DDoS attack tool for sending forged UDP packets to vulnerable Memcached servers obtained using Shodan API
Python
1,258
star
2

Crashcast-Exploit

This tool allows you mass play any YouTube video, terminate apps and rename Chromecast device(s) obtained from Shodan.io
Python
162
star
3

Apache-Struts-Shodan-Exploit

This tool takes advantage of CVE-2018-11776 and Shodan to perform mass exploitation of verified and vulnerable Apache Struts servers.
Python
53
star
4

Memfixed-Mitigation-Tool

DDoS mitigation tool for sending flush or shutdown commands to vulnerable Memcached servers obtained using Shodan API
Python
48
star
5

Crash-iOS-Exploit

Repository dedicated to storing a multitude of iOS/macOS/OSX/watchOS crash bugs. Some samples need to be viewed as raw in order to see the Unicode. Please do not intentionally abuse these exploits.
HTML
39
star
6

Netscraped-Exploit

Framework for obtaining all the credentials stored in vulnerable Netwave IP cameras. Can be used to break into IP cameras, use for research only.
Python
34
star
7

Chrome-Sandbox-Exploit

[Patched] Sandbox escape Chrome exploit. Allows the execution of local binaries, read/write functions and exfiltration of Chrome OAuth tokens to remote server. More info: https://bugs.chromium.org/p/chromium/issues/detail?id=386988
HTML
29
star
8

BroadPWN

This Exploit allows arbitrary memory writes and reads. Running the specified payload within this package will write to the device's main CPU kernel, causing it to crash. More information about its origins here: http://boosterok.com/blog/broadpwn2/
Python
28
star
9

APT38-DYEPACK

Reverse engineered APT38 DYEPACK samples used to empty SWIFT banking servers. Use caution when handling live binaries.
23
star
10

Pingpon-Exploit

Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.
Python
21
star
11

TOR-0day

JavaScript exploit : Firefox version 41 - 50 are affected. Easy fix by disabling JavaScript (use NoScript for better leverage). Victim must visit website using correct version of Tor in order to be potentially deanonymized.
JavaScript
21
star
12

Onity-Lock-Bypass

Upload this sketch to any Arduino and break into millions of Onity hotel locks worldwide. DC (coaxial) barrel connector required. For more info visit: http://demoseen.com/bhpaper.html
Arduino
20
star
13

FuzzBunch

The ORIGINAL decrypted copies of the Shadow Broker's Lost In Translation release. Contains FuzzBunch, DanderSpritz, and all the other NSA [Equation Group] toolkits. Please use them only for researching purposes.
Python
18
star
14

EquationDrug

The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use for research purposes only.
17
star
15

Mifare-Skimmer

Arduino based device for reading Mifare cards from a distance using RC522 module and an OLED display for portable reading of card data.
C++
16
star
16

EQGRP-Warez

The ORIGINAL decrypted copies of the Shadow Broker's Don't Forget Your Base release. Contains Equation group's collection of tools primarily for compromising Linux/Unix based environments. Use for research purposes only. (ref: eqgrp-auction-file.tar.xz)
Perl
15
star
17

Vendont-Scraper

Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.
Python
10
star
18

Invisible-Login-Forms

Stealing user credentials by injecting invisible login forms that the native browser autofills data to. More info: https://freedom-to-tinker.com/2017/12/27/no-boundaries-for-user-identities-web-trackers-exploit-browser-login-managers/
HTML
10
star
19

Pybomb

Python 3 script that compiles into a >32TB .pyc-file. Execute to deplete RAM, or compile for full 32TB file output: "python -m py_compile ./Pybomb.py"
Python
8
star
20

CVE-2017-5415

Addressbar spoofing through blob URL (Firefox browser). An attack can use a blob URL and script to spoof an arbitrary addressbar URL prefaced by blob: as the protocol, leading to user confusion and further spoofing attacks.
HTML
7
star
21

Rijndael-Encryption-Algorithm

The Advanced Encryption Standard (AES), also known by its original name Rijndael is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001.
Python
6
star
22

Telnet-Chatroom

Turn your Arduino (UNO) into a telnet chatroom server! Good for sharing links between multiple computers, or just chatting.
C++
5
star
23

Leonardo-HID-Payload-v2.2

Less code, faster execution, clean UAC bypass, clears execution history, and more button and LED functions added. (HID Payload for Arduino, see previous version)
Arduino
5
star
24

Binary-Search-Tree

A binary search tree (BST) is a binary tree where each node has a comparable key (and an associated value) and satisfies the restriction that the key in any node is larger than the keys in all nodes in that node's left subtree and smaller than the keys in all nodes in that node's right subtree.
C++
5
star
25

The-Collection-Statistics

Domain and TLD statistics of "The Collection (1-5), Antipublic, AP MYR & Zabugor" breach exposure. Contains number of matches per file within, based on provider.
4
star
26

Redditor-Bot

This is a Reddit bot that scans all possible 3-character (A-Z, 0-9, _, -) usernames and determines which ones are available.
Python
4
star
27

Matrix-Chain-Multiplication

Dynamic programming algorithm: matrix chain multiplication, where the goal is to find the most computationally efficient matrix order when multiplying an arbitrary number of matrices in a row.
C++
4
star
28

Basic-Keylogger

Windows based keylogger (written in C++). Collects all keystrokes and places them in a file "LOG.txt" in the same directory as its binaries.
C++
4
star
29

Arduino-badUSB

Arduino badUSB framework for launching HID payloads. Comes with preconfigured payload selector and web service. Uses Arduino Leonardo board, LCD keypad, and ethernet shield.
C++
4
star
30

Leonardo-HID-Payload-v1.0

Human Interface Device Payload that allows your Arduino Leonardo board to execute commands by emulating a keyboard and accessing a terminal with elevated privileges on Windows based machines.
Arduino
4
star
31

Python-Tutorials

Easy to follow Python tutorials for any beginners! Scripts are labelled in accordance to its category. Helpful commenting is also included.
Python
3
star
32

Linked-List

A linked list is a linear data structure where each element is a separate object. Each element (we will call it a node) of a list is comprising of two items - the data and a reference to the next node. The last node has a reference to null. The entry point into a linked list is called the head of the list.
C++
3
star
33

Max-Subarray

The maximum subarray problem is the task of finding the contiguous subarray within a one-dimensional array, a[1...n], of numbers which has the largest sum. This script solves the max subarray problem via divide-and-conquer with O(nlogn) time complexity.
C++
3
star
34

Hash-Table

A hash table is a data structure that implements an associative array abstract data type, a structure that can map keys to values. Lookups are O(1). Collisions are solved using chaining method in which chained indexes are O(n).
C++
2
star
35

Radix-Sort

Radix sort is a non-comparative integer sorting algorithm that sorts data with integer keys by grouping keys by the individual digits which share the same significant position and value.
C++
2
star
36

Huffman-Codes

A Huffman code is a particular type of optimal prefix code that is commonly used for lossless data compression.
C++
2
star
37

SPUZBlogGen

Python application that's used to produce spuz.me blog posts. Feel free to use this script to contribute to SPUZ or to reverse engineer and produce your own blog posts!
Python
2
star
38

PHP-Tutorials

Easy to follow PHP tutorials for any beginners! Scripts are labelled in accordance to its category. Helpful commenting is also included.
PHP
2
star
39

Heap-Sort

Heapsort is a comparison-based sorting algorithm. Heapsort can be thought of as an improved selection sort: like that algorithm, it divides its input into a sorted and an unsorted region, and it iteratively shrinks the unsorted region by extracting the largest element and moving that to the sorted region.
C++
2
star
40

Rod-Cutting

Dynamic programming algorithm: given a rod of length n inches and a table of prices "Pi", i=1,2,…,n, this algorithm finds the maximum revenue "Rn" obtainable by cutting up the rod and selling the pieces.
C++
1
star
41

Quick-Sort

Quicksort is an efficient sorting algorithm, serving as a systematic method for placing the elements of an array in order.
C++
1
star
42

Merge-Sort

Merge sort is an efficient, general-purpose, comparison-based, divide and conquer sorting algorithm.
C++
1
star
43

Binary-Search

Binary search is a search algorithm that finds the position of a target value within a sorted array.
C++
1
star
44

Insertion-Sort

Insertion sort is a simple sorting algorithm that builds the final sorted array (or list) one item at a time.
C++
1
star
45

rgrep

rgrep is a command-line utility for searching plain-text data sets for lines that match a regular expression.
C
1
star