Curated archive of tools from the Wikileaks CIA hacking tool leak, pull requests welcome https://wikileaks.org/ciav7p1/
☆127Mar 7, 2017Updated 9 years ago
Alternatives and similar repositories for cia-hacking-tool-archive
Users that are interested in cia-hacking-tool-archive are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- WikiLeaks Vault 7 CIA Hacking Tools☆207Aug 15, 2023Updated 2 years ago
- Every document published from the Snowden archive☆74Apr 7, 2015Updated 11 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆13Aug 31, 2019Updated 6 years ago
- WhatsApp forensics analysis and acquisition utility☆26Apr 2, 2013Updated 13 years ago
- Base Code for P2P Network Crawlers☆32Aug 2, 2013Updated 12 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Some Python to process the Wikileaks Cablegate data.☆19Nov 30, 2010Updated 15 years ago
- ☆13Oct 14, 2017Updated 8 years ago
- 🌍 🕵️ Arch-Osint Linux OS VM based on Blackarch.☆28Sep 8, 2023Updated 2 years ago
- The Intel 8080 ("eighty-eighty") is the second 8-bit microprocessor designed and manufactured by Intel.☆15May 25, 2022Updated 3 years ago
- A script for easily building customized images of pentesting distros (Kali and ParrotSec).☆17Dec 1, 2020Updated 5 years ago
- WPA Attack - Easy breaking WPA WPA2 networks by typing one command☆21Jun 15, 2015Updated 10 years ago
- A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.☆36Aug 12, 2023Updated 2 years ago
- Automatically hacking usb stick (gets passwords + keylogger)☆250Mar 11, 2019Updated 7 years ago
- Search inside Snowden/NSA/GCHQ/whatever documents☆11Jul 11, 2014Updated 11 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Launch a Windows EXE file with this EXE file (application filter evasion)☆14Mar 10, 2017Updated 9 years ago
- Script hecho en python, para sacar la IP, de las paginas web.☆11Aug 25, 2022Updated 3 years ago
- Working POC of Mikrotik exploit from Vault 7 CIA Leaks☆662Sep 20, 2022Updated 3 years ago
- Spring Cloud Gateway Actuator API SpEL Code Injection (CVE-2022-22947)☆11Apr 15, 2022Updated 4 years ago
- Public exploits (re)writed while learning.☆14Aug 7, 2013Updated 12 years ago
- Collection of ezine about virii☆17Sep 13, 2022Updated 3 years ago
- Exploiting ring0 memcpy-like functionality to disable Driver Signing Enforcement (DSE)☆19Apr 12, 2020Updated 6 years ago
- Exploits USB HID to steal passwords saved in Google Chrome☆70Sep 17, 2017Updated 8 years ago
- Code for testing krackattacks☆10Oct 18, 2017Updated 8 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- GUI Tool to generate threat intelligence information in various formats☆45Jan 18, 2018Updated 8 years ago
- Open Redirect Vulnerability Payload List☆11Feb 23, 2021Updated 5 years ago
- Watch and listen 🇵🇹 RTP Play without a browser☆18Jan 24, 2026Updated 3 months ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆13Aug 9, 2016Updated 9 years ago
- Data retrieved via a quick & dirty web scraper. Currently contains the text data from each page that was dumped as of 2017-03-07. File na…☆21Mar 10, 2017Updated 9 years ago
- ☆36Feb 9, 2018Updated 8 years ago
- Schematics & Firmware for self-tuning portable RF Jammer☆12Feb 2, 2018Updated 8 years ago
- SuperNES - Super Nmap Easy Scanner☆10Oct 2, 2018Updated 7 years ago
- A brief analysis of the BlueBorne Vulnerability Scanner app by Armis☆23Sep 14, 2017Updated 8 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- his program shows you IMSI numbers, country, brand and operator of cellphones around you. /!\ This program was made to understand how GS…☆13Dec 27, 2018Updated 7 years ago
- Counter Surveillance and OPSEC research☆111Apr 2, 2025Updated last year
- A lightweight python system dashboard written in cherry py delivered over the web.☆10May 8, 2026Updated 2 weeks ago
- Collection of white, grey and blackHat tools - for use playing around. setting up and operating pentesting linux builds - Primarily Kali-…☆24May 15, 2018Updated 8 years ago
- Code for Malware which spreads by injecting pendrive and sends IP address and MAC ID to Attackers Email☆72Jul 10, 2018Updated 7 years ago
- Malicious Software SRC Extract☆31Jan 2, 2023Updated 3 years ago
- 🔵 ethereum grid trading bot☆36Oct 10, 2025Updated 7 months ago