DonnchaC / cia-hacking-tool-archiveView external linksLinks
Curated archive of tools from the Wikileaks CIA hacking tool leak, pull requests welcome https://wikileaks.org/ciav7p1/
☆125Mar 7, 2017Updated 8 years ago
Alternatives and similar repositories for cia-hacking-tool-archive
Users that are interested in cia-hacking-tool-archive are comparing it to the libraries listed below
Sorting:
- Mirror of Shadowbrokers release from https://steemit.com/shadowbrokers/@theshadowbrokers/lost-in-translation☆490Apr 14, 2017Updated 8 years ago
- Every document published from the Snowden archive☆73Apr 7, 2015Updated 10 years ago
- WikiLeaks Vault 7 CIA Hacking Tools☆196Aug 15, 2023Updated 2 years ago
- Clone repository for Source Code secret anti-forensic tools Marble Framework CIA, Leaked by WikiLeaks.☆29Apr 1, 2017Updated 8 years ago
- Presenting BomberWhole to Unlimited Messages Any Social Media! 💣☆10Feb 22, 2021Updated 4 years ago
- WhatsApp forensics analysis and acquisition utility☆26Apr 2, 2013Updated 12 years ago
- 🌍 🕵️ Arch-Osint Linux OS VM based on Blackarch.☆25Sep 8, 2023Updated 2 years ago
- A brief analysis of the BlueBorne Vulnerability Scanner app by Armis☆24Sep 14, 2017Updated 8 years ago
- ☆11Feb 6, 2019Updated 7 years ago
- Proof of concept implementation of a cyber threat intelligence and incident handling platform☆11Feb 10, 2023Updated 3 years ago
- Uptime checker for tor hidden services☆12Feb 14, 2018Updated 8 years ago
- Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resou…☆10Dec 3, 2020Updated 5 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Aug 31, 2019Updated 6 years ago
- A lightweight python system dashboard written in cherry py delivered over the web.☆10Sep 20, 2022Updated 3 years ago
- Code for Malware which spreads by injecting pendrive and sends IP address and MAC ID to Attackers Email☆72Jul 10, 2018Updated 7 years ago
- Counter Surveillance and OPSEC research☆107Apr 2, 2025Updated 10 months ago
- Tools and library to manipulate EFI variables.☆10Jan 16, 2026Updated last month
- Python code examples for working with the Slack API. 2.x and 3.x compatible code.☆13May 19, 2016Updated 9 years ago
- HAT project is specially created to install latest update of Metasploit Framework & to install all required Reverse Engineer Tools with r…☆13Oct 28, 2019Updated 6 years ago
- Cyber Threat Intelligence Appliance☆13Dec 8, 2022Updated 3 years ago
- Search inside Snowden/NSA/GCHQ/whatever documents☆11Jul 11, 2014Updated 11 years ago
- UEFI keylogger prototype☆10May 10, 2017Updated 8 years ago
- A repository of LIVE malwares for your own joy and pleasure☆16Apr 21, 2016Updated 9 years ago
- Open Redirect Vulnerability Payload List☆10Feb 23, 2021Updated 4 years ago
- The GitHub release of the "Windows 10 Tweaks and Debloat Project" (https://archive.codeplex.com/?p=windows10tweaksanddebloat) For which I…☆13May 27, 2020Updated 5 years ago
- The Fuzzil is a program which injects automatically data into a webpage and detect potential bugs.☆21Mar 5, 2020Updated 5 years ago
- Automatically hacking usb stick (gets passwords + keylogger)☆246Mar 11, 2019Updated 6 years ago
- Windows Reverse TCP backdoor☆29Apr 28, 2019Updated 6 years ago
- Old home of LimaCharlie, open source EDR☆32Sep 4, 2023Updated 2 years ago
- ☆13Feb 29, 2020Updated 5 years ago
- A Python program to track the location of the ISS and other satellites☆12Jul 15, 2025Updated 7 months ago
- his program shows you IMSI numbers, country, brand and operator of cellphones around you. /!\ This program was made to understand how GS…☆12Dec 27, 2018Updated 7 years ago
- This is a simple but very powerful sms spamming program that is coded in visual basic. I could not find a program for my needs with no vi…☆12May 24, 2013Updated 12 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Apr 25, 2017Updated 8 years ago
- Malicious Software SRC Extract☆32Jan 2, 2023Updated 3 years ago
- Gichidan - CLI wrapper for Ichidan deep-web search engine.☆32Apr 20, 2018Updated 7 years ago
- Automated Brute-Force Login Attacks Against EAP Networks.☆58Mar 19, 2020Updated 5 years ago
- agent.btz download MALWARE BINARY PROVIDED + POC video☆17Jul 11, 2021Updated 4 years ago
- The Intel 8080 ("eighty-eighty") is the second 8-bit microprocessor designed and manufactured by Intel.☆15May 25, 2022Updated 3 years ago