Need help with shadowbroker?
Click the “chat” button below for chat support from the developer who created it, or find similar developers for support.

About the developer

4.0K Stars 458 Forks 24 Commits 8 Opened issues


The Shadow Brokers "Lost In Translation" leak

Services available


Need anything else?

Contributors list

# 45,816
12 commits
# 33,286
3 commits
# 165,566
1 commit
# 164,676
1 commit

The following files were deleted after this repository was reported because it contained "sensitive data":

  • /swift/005590ENSBDVPN5-02AUG2013
  • /swift/005600ENSBDVPN6-02AUG2013
  • /swift/006970ENSBDVPN5-23AUG2013
  • /swift/007020ENSBDVPN6-23AUG2013
  • /swift/EastnetsHugeMap0513_2010.vsd
  • /swift/ENSB%20UAE%20NW%20Topology%20V2.0.1339670413.vsd
  • swift/005030254.242_2013mar02
  • swift/005460ensbdasa-09aug2013
  • swift/005540ensbdpix4-09aug2013
  • swift/005550ensbdrtr1-2013aug09
  • swift/005662FW1-Configuration.txt
  • swift/005663SW1-Configuration.txt
  • swift/005664SW2-Configuration.txt
  • swift/007080ensbdasa1-31aug2013
  • swift/007100ensbdfw1-2013sep06
  • swift/007110ensbdfw3-2013sep06
  • swift/007130ensbdfw4-2013sep06
  • swift/007150ensbdfw5-2013sep06
  • swift/007200ensbdpix3-31aug2013
  • swift/007250ensbdpix4-31aug2013
  • swift/007270ensbdpix5-31aug2013
  • swift/007290ensbdrtr1-2013sep06
  • swift/DNS%20Zone%20Trans%20201310
  • swift/DNS%20Zone%20Trans%20201310
  • swift/NOCfirewallpasswords_30May2


  • EARLYSHOVEL RedHat 7.0 - 7.1 Sendmail 8.11.x exploit
  • EBBISLAND (EBBSHAVE) root RCE via RPC XDR overflow in Solaris 6, 7, 8, 9 & 10 (possibly newer) both SPARC and x86.
  • ECHOWRECKER remote Samba 3.0.x Linux exploit.
  • EASYBEE appears to be an MDaemon email server vulnerability
  • EASYFUN EasyFun 2.2.0 Exploit for WDaemon / IIS MDaemon/WorldClient pre 9.5.6
  • EASYPI is an IBM Lotus Notes exploit that gets detected as Stuxnet
  • EWOKFRENZY is an exploit for IBM Lotus Domino 6.5.4 & 7.0.2
  • EXPLODINGCAN is an IIS 6.0 exploit that creates a remote backdoor
  • ETERNALROMANCE is a SMB1 exploit over TCP port 445 which targets XP, 2003, Vista, 7, Windows 8, 2008, 2008 R2, and gives SYSTEM privileges (MS17-010)
  • EDUCATEDSCHOLAR is a SMB exploit (MS09-050)
  • EMERALDTHREAD is a SMB exploit for Windows XP and Server 2003 (MS10-061)
  • EMPHASISMINE is a remote IMAP exploit for IBM Lotus Domino 6.6.4 to 8.5.2
  • ENGLISHMANSDENTIST sets Outlook Exchange WebAccess rules to trigger executable code on the client's side to send an email to other users
  • EPICHERO 0-day exploit (RCE) for Avaya Call Server
  • ERRATICGOPHER is a SMBv1 exploit targeting Windows XP and Server 2003
  • ETERNALSYNERGY is a SMBv3 remote code execution flaw for Windows 8 and Server 2012 SP0 (MS17-010)
  • ETERNALBLUE is a SMBv2 exploit for Windows 7 SP1 (MS17-010)
  • ETERNALCHAMPION is a SMBv1 exploit
  • ESKIMOROLL is a Kerberos exploit targeting 2000, 2003, 2008 and 2008 R2 domain controllers
  • ESTEEMAUDIT is an RDP exploit and backdoor for Windows Server 2003
  • ECLIPSEDWING is an RCE exploit for the Server service in Windows Server 2008 and later (MS08-067)
  • ETRE is an exploit for IMail 8.10 to 8.22
  • ETCETERABLUE is an exploit for IMail 7.04 to 8.05
  • FUZZBUNCH is an exploit framework, similar to MetaSploit
  • ODDJOB is an implant builder and C&C server that can deliver exploits for Windows 2000 and later, also not detected by any AV vendors
  • EAGERLEVER NBT/SMB exploit for Windows NT4.0, 2000, XP SP1 & SP2, 2003 SP1 & Base Release
  • EASYFUN WordClient / IIS6.0 exploit


  • PASSFREELY utility which "Bypasses authentication for Oracle servers"
  • SMBTOUCH check if the target is vulnerable to samba exploits like ETERNALSYNERGY, ETERNALBLUE, ETERNALROMANCE
  • ERRATICGOPHERTOUCH Check if the target is running some RPC
  • IISTOUCH check if the running IIS version is vulnerable
  • RPCOUTCH get info about windows via RPC
  • DOPU used to connect to machines exploited by ETERNALCHAMPIONS
  • NAMEDPIPETOUCH Utility to test for a predefined list of named pipes, mostly AV detection. User can add checks for custom named pipes.

We use cookies. If you continue to browse the site, you agree to the use of cookies. For more information on our use of cookies please see our Privacy Policy.