Curated archive of tools from the Wikileaks CIA hacking tool leak, pull requests welcome https://wikileaks.org/ciav7p1/
β125Mar 7, 2017Updated 9 years ago
Alternatives and similar repositories for cia-hacking-tool-archive
Users that are interested in cia-hacking-tool-archive are comparing it to the libraries listed below
Sorting:
- Mirror of Shadowbrokers release from https://steemit.com/shadowbrokers/@theshadowbrokers/lost-in-translationβ498Apr 14, 2017Updated 8 years ago
- Presenting BomberWhole to Unlimited Messages Any Social Media! π£β10Feb 22, 2021Updated 5 years ago
- Exploits USB HID to steal passwords saved in Google Chromeβ70Sep 17, 2017Updated 8 years ago
- WhatsApp forensics analysis and acquisition utilityβ26Apr 2, 2013Updated 12 years ago
- Script hecho en python, para sacar la IP, de las paginas web.β11Aug 25, 2022Updated 3 years ago
- AxSpy is an application who allow you to monitoring an Android phone for free. Ideal for parents who want to keep an eye on their childreβ¦β10Dec 10, 2013Updated 12 years ago
- A brief analysis of the BlueBorne Vulnerability Scanner app by Armisβ24Sep 14, 2017Updated 8 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommendedβ12Aug 31, 2019Updated 6 years ago
- A lightweight python system dashboard written in cherry py delivered over the web.β10Sep 20, 2022Updated 3 years ago
- Some Python to process the Wikileaks Cablegate data.β19Nov 30, 2010Updated 15 years ago
- Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resouβ¦β10Dec 3, 2020Updated 5 years ago
- Uptime checker for tor hidden servicesβ12Feb 14, 2018Updated 8 years ago
- β11Feb 6, 2019Updated 7 years ago
- Project to implement and automate juice jacking: the stealing of phone data through USB connectionsβ101Apr 25, 2017Updated 8 years ago
- Code for Malware which spreads by injecting pendrive and sends IP address and MAC ID to Attackers Emailβ72Jul 10, 2018Updated 7 years ago
- Counter Surveillance and OPSEC researchβ109Apr 2, 2025Updated 11 months ago
- Tools and library to manipulate EFI variables.β10Mar 2, 2026Updated last week
- Python code examples for working with the Slack API. 2.x and 3.x compatible code.β13May 19, 2016Updated 9 years ago
- Collection of different rootkit functionality, each driver representing a different rootkit componentβ12May 27, 2025Updated 9 months ago
- A repository of LIVE malwares for your own joy and pleasureβ16Apr 21, 2016Updated 9 years ago
- UEFI keylogger prototypeβ10May 10, 2017Updated 8 years ago
- Open Redirect Vulnerability Payload Listβ10Feb 23, 2021Updated 5 years ago
- Cyber Threat Intelligence Applianceβ13Dec 8, 2022Updated 3 years ago
- HAT project is specially created to install latest update of Metasploit Framework & to install all required Reverse Engineer Tools with rβ¦β13Oct 28, 2019Updated 6 years ago
- The Fuzzil is a program which injects automatically data into a webpage and detect potential bugs.β21Mar 5, 2020Updated 6 years ago
- Automatically hacking usb stick (gets passwords + keylogger)β249Mar 11, 2019Updated 6 years ago
- Windows Reverse TCP backdoorβ28Apr 28, 2019Updated 6 years ago
- Old home of LimaCharlie, open source EDRβ32Sep 4, 2023Updated 2 years ago
- A loader and analyzer for ESP8266 firmwareβ15Feb 20, 2026Updated 2 weeks ago
- his program shows you IMSI numbers, country, brand and operator of cellphones around you. /!\ This program was made to understand how GSβ¦β13Dec 27, 2018Updated 7 years ago
- β13Oct 14, 2017Updated 8 years ago
- Tool to identify all domains contained in an IP anonymouslyβ15Jun 4, 2017Updated 8 years ago
- A Python program to track the location of the ISS and other satellitesβ12Jul 15, 2025Updated 7 months ago
- This is a simple but very powerful sms spamming program that is coded in visual basic. I could not find a program for my needs with no viβ¦β12May 24, 2013Updated 12 years ago
- β13Feb 29, 2020Updated 6 years ago
- Malicious Software SRC Extractβ32Jan 2, 2023Updated 3 years ago
- H2HC 2017 Slides/Materials/Presentationsβ48Feb 5, 2018Updated 8 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, β¦β13Aug 9, 2016Updated 9 years ago
- The Intel 8080 ("eighty-eighty") is the second 8-bit microprocessor designed and manufactured by Intel.β15May 25, 2022Updated 3 years ago