There are no reviews yet. Be the first to send feedback to the community and the maintainers!
Memcrashed-DDoS-Exploit
DDoS attack tool for sending forged UDP packets to vulnerable Memcached servers obtained using Shodan APICrashcast-Exploit
This tool allows you mass play any YouTube video, terminate apps and rename Chromecast device(s) obtained from Shodan.ioApache-Struts-Shodan-Exploit
This tool takes advantage of CVE-2018-11776 and Shodan to perform mass exploitation of verified and vulnerable Apache Struts servers.Memfixed-Mitigation-Tool
DDoS mitigation tool for sending flush or shutdown commands to vulnerable Memcached servers obtained using Shodan APICrash-iOS-Exploit
Repository dedicated to storing a multitude of iOS/macOS/OSX/watchOS crash bugs. Some samples need to be viewed as raw in order to see the Unicode. Please do not intentionally abuse these exploits.Netscraped-Exploit
Framework for obtaining all the credentials stored in vulnerable Netwave IP cameras. Can be used to break into IP cameras, use for research only.Chrome-Sandbox-Exploit
[Patched] Sandbox escape Chrome exploit. Allows the execution of local binaries, read/write functions and exfiltration of Chrome OAuth tokens to remote server. More info: https://bugs.chromium.org/p/chromium/issues/detail?id=386988BroadPWN
This Exploit allows arbitrary memory writes and reads. Running the specified payload within this package will write to the device's main CPU kernel, causing it to crash. More information about its origins here: http://boosterok.com/blog/broadpwn2/APT38-DYEPACK
Reverse engineered APT38 DYEPACK samples used to empty SWIFT banking servers. Use caution when handling live binaries.Pingpon-Exploit
Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.TOR-0day
JavaScript exploit : Firefox version 41 - 50 are affected. Easy fix by disabling JavaScript (use NoScript for better leverage). Victim must visit website using correct version of Tor in order to be potentially deanonymized.FuzzBunch
The ORIGINAL decrypted copies of the Shadow Broker's Lost In Translation release. Contains FuzzBunch, DanderSpritz, and all the other NSA [Equation Group] toolkits. Please use them only for researching purposes.EquationDrug
The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use for research purposes only.Mifare-Skimmer
Arduino based device for reading Mifare cards from a distance using RC522 module and an OLED display for portable reading of card data.EQGRP-Warez
The ORIGINAL decrypted copies of the Shadow Broker's Don't Forget Your Base release. Contains Equation group's collection of tools primarily for compromising Linux/Unix based environments. Use for research purposes only. (ref: eqgrp-auction-file.tar.xz)EQGRP-TrickOrTreat
The ORIGINAL decrypted copies of the Shadow Broker's Trick Or Treat release. Contains a list of servers, supposedly compromised by Equation Group as well as references to seven supposedly undisclosed tools (DEWDROP, INCISION, JACKLADDER, ORANGUTAN, PATCHICILLIN, RETICULUM, SIDETRACK AND STOCSURGEON) also used by the threat actor.Vendont-Scraper
Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.Invisible-Login-Forms
Stealing user credentials by injecting invisible login forms that the native browser autofills data to. More info: https://freedom-to-tinker.com/2017/12/27/no-boundaries-for-user-identities-web-trackers-exploit-browser-login-managers/Pybomb
Python 3 script that compiles into a >32TB .pyc-file. Execute to deplete RAM, or compile for full 32TB file output: "python -m py_compile ./Pybomb.py"CVE-2017-5415
Addressbar spoofing through blob URL (Firefox browser). An attack can use a blob URL and script to spoof an arbitrary addressbar URL prefaced by blob: as the protocol, leading to user confusion and further spoofing attacks.Rijndael-Encryption-Algorithm
The Advanced Encryption Standard (AES), also known by its original name Rijndael is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001.Telnet-Chatroom
Turn your Arduino (UNO) into a telnet chatroom server! Good for sharing links between multiple computers, or just chatting.Leonardo-HID-Payload-v2.2
Less code, faster execution, clean UAC bypass, clears execution history, and more button and LED functions added. (HID Payload for Arduino, see previous version)Binary-Search-Tree
A binary search tree (BST) is a binary tree where each node has a comparable key (and an associated value) and satisfies the restriction that the key in any node is larger than the keys in all nodes in that node's left subtree and smaller than the keys in all nodes in that node's right subtree.The-Collection-Statistics
Domain and TLD statistics of "The Collection (1-5), Antipublic, AP MYR & Zabugor" breach exposure. Contains number of matches per file within, based on provider.Redditor-Bot
This is a Reddit bot that scans all possible 3-character (A-Z, 0-9, _, -) usernames and determines which ones are available.Matrix-Chain-Multiplication
Dynamic programming algorithm: matrix chain multiplication, where the goal is to find the most computationally efficient matrix order when multiplying an arbitrary number of matrices in a row.Basic-Keylogger
Windows based keylogger (written in C++). Collects all keystrokes and places them in a file "LOG.txt" in the same directory as its binaries.Arduino-badUSB
Arduino badUSB framework for launching HID payloads. Comes with preconfigured payload selector and web service. Uses Arduino Leonardo board, LCD keypad, and ethernet shield.Leonardo-HID-Payload-v1.0
Human Interface Device Payload that allows your Arduino Leonardo board to execute commands by emulating a keyboard and accessing a terminal with elevated privileges on Windows based machines.Python-Tutorials
Easy to follow Python tutorials for any beginners! Scripts are labelled in accordance to its category. Helpful commenting is also included.Linked-List
A linked list is a linear data structure where each element is a separate object. Each element (we will call it a node) of a list is comprising of two items - the data and a reference to the next node. The last node has a reference to null. The entry point into a linked list is called the head of the list.Max-Subarray
The maximum subarray problem is the task of finding the contiguous subarray within a one-dimensional array, a[1...n], of numbers which has the largest sum. This script solves the max subarray problem via divide-and-conquer with O(nlogn) time complexity.Hash-Table
A hash table is a data structure that implements an associative array abstract data type, a structure that can map keys to values. Lookups are O(1). Collisions are solved using chaining method in which chained indexes are O(n).Radix-Sort
Radix sort is a non-comparative integer sorting algorithm that sorts data with integer keys by grouping keys by the individual digits which share the same significant position and value.Huffman-Codes
A Huffman code is a particular type of optimal prefix code that is commonly used for lossless data compression.SPUZBlogGen
Python application that's used to produce spuz.me blog posts. Feel free to use this script to contribute to SPUZ or to reverse engineer and produce your own blog posts!PHP-Tutorials
Easy to follow PHP tutorials for any beginners! Scripts are labelled in accordance to its category. Helpful commenting is also included.Heap-Sort
Heapsort is a comparison-based sorting algorithm. Heapsort can be thought of as an improved selection sort: like that algorithm, it divides its input into a sorted and an unsorted region, and it iteratively shrinks the unsorted region by extracting the largest element and moving that to the sorted region.Rod-Cutting
Dynamic programming algorithm: given a rod of length n inches and a table of prices "Pi", i=1,2,β¦,n, this algorithm finds the maximum revenue "Rn" obtainable by cutting up the rod and selling the pieces.Quick-Sort
Quicksort is an efficient sorting algorithm, serving as a systematic method for placing the elements of an array in order.Merge-Sort
Merge sort is an efficient, general-purpose, comparison-based, divide and conquer sorting algorithm.Binary-Search
Binary search is a search algorithm that finds the position of a target value within a sorted array.Insertion-Sort
Insertion sort is a simple sorting algorithm that builds the final sorted array (or list) one item at a time.rgrep
rgrep is a command-line utility for searching plain-text data sets for lines that match a regular expression.Love Open Source and this site? Check out how you can help us