Notes from https://musalbas.com/2016/08/16/equation-group-firewall-operations-catalogue.html

EXPLOIT: ELIGIBLEBOMBSHELL 

A remote code execution exploit for TOPSEC firewalls that exploits a HTTP cookie command injection vulnerability, affecting versions 3.2.100.010.1_pbc_17_iv_3 to 3.3.005.066.1. Version detection by ETag examination.

PAYLOAD: WOBBLYLLAMA

A payload for the ELIGIBLEBOMBSHELL TOPSEC firewall exploit affecting version 3.3.002.030.8_003.

PAYLOAD: FLOCKFORWARD

A payload for the ELIGIBLEBOMBSHELL TOPSEC firewall exploit affecting version 3.3.005.066.1.

PAYLOAD: HIDDENTEMPLE

A payload for the ELIGIBLEBOMBSHELL TOPSEC firewall exploit affecting version tos_3.2.8840.1.

PAYLOAD: CONTAINMENTGRID

A payload for the ELIGIBLEBOMBSHELL TOPSEC firewall exploit affecting version tos_3.3.005.066.1.

PAYLOAD: GOTHAMKNIGHT

A payload for the ELIGIBLEBOMBSHELL TOPSEC firewall exploit affecting version 3.2.100.010.8_pbc_27. Has no BLATSTING support.
