The Shadow Brokers "Lost In Translation" leak. Decrypted content of odd.tar.xz.gpg, swift.tar.xz.gpg and windows.tar.xz.gpg
-
Updated
Apr 17, 2017 - Python
The Shadow Brokers "Lost In Translation" leak. Decrypted content of odd.tar.xz.gpg, swift.tar.xz.gpg and windows.tar.xz.gpg
Decrypted content of eqgrp-auction-file.tar.xz
A python2 script for sweeping a network to find windows systems compromised with the DOUBLEPULSAR implant.
Getting Envisioncollision to actually work.
完整版:the purported Equation Group(NSA下属) hack by the Shadow Brokers(影子经纪人)--234MB
Eternalblue & DoublePulsar scanner
shadowbroker SMB exploit scanner. Scans for ETERNALSYNERGY ETERNALBLUE ETERNALROMANCE ETHERNALCHAMPION
REPTILEHAUS' simplified build process of Worawit Wang' (@sleepya_) version of EternalBlue.. The NSA exploit brought to you by the ShadowBrokers for exploiting MS17-010
The goal of this project is to examine, reverse, and document the different modules available in the Equation Group's DanderSpritz post-exploitation framework leaked by the ShadowBrokers
Decrypted content of odd.tar.xz.gpg, swift.tar.xz.gpg and windows.tar.xz.gpg
Decrypted content of eqgrp-auction-file.tar.xz
Add a description, image, and links to the shadowbrokers topic page so that developers can more easily learn about it.
To associate your repository with the shadowbrokers topic, visit your repo's landing page and select "manage topics."