Curated archive of tools from the Wikileaks CIA hacking tool leak, pull requests welcome https://wikileaks.org/ciav7p1/
☆128Mar 7, 2017Updated 9 years ago
Alternatives and similar repositories for cia-hacking-tool-archive
Users that are interested in cia-hacking-tool-archive are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Mirror of Shadowbrokers release from https://steemit.com/shadowbrokers/@theshadowbrokers/lost-in-translation☆513Apr 14, 2017Updated 9 years ago
- WikiLeaks Vault 7 CIA Hacking Tools☆205Aug 15, 2023Updated 2 years ago
- Clone repository for Source Code secret anti-forensic tools Marble Framework CIA, Leaked by WikiLeaks.☆29Apr 1, 2017Updated 9 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆13Aug 31, 2019Updated 6 years ago
- WhatsApp forensics analysis and acquisition utility☆26Apr 2, 2013Updated 13 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Base Code for P2P Network Crawlers☆32Aug 2, 2013Updated 12 years ago
- Ping2death is a ddos to send packet over a user.. Its has a custom amount of packet☆15Sep 22, 2021Updated 4 years ago
- Some Python to process the Wikileaks Cablegate data.☆19Nov 30, 2010Updated 15 years ago
- Rounded displays for X-based windowing systems 🐧☆11Dec 9, 2019Updated 6 years ago
- The Intel 8080 ("eighty-eighty") is the second 8-bit microprocessor designed and manufactured by Intel.☆15May 25, 2022Updated 3 years ago
- The GitHub release of the "Windows 10 Tweaks and Debloat Project" (https://archive.codeplex.com/?p=windows10tweaksanddebloat) For which I…☆13May 27, 2020Updated 5 years ago
- A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.☆36Aug 12, 2023Updated 2 years ago
- Vault 7: CIA Hacking Tools Revealed☆17Mar 8, 2017Updated 9 years ago
- Search inside Snowden/NSA/GCHQ/whatever documents☆11Jul 11, 2014Updated 11 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Script hecho en python, para sacar la IP, de las paginas web.☆11Aug 25, 2022Updated 3 years ago
- A repository of LIVE malwares for your own joy and pleasure☆16Apr 21, 2016Updated 10 years ago
- Spring Cloud Gateway Actuator API SpEL Code Injection (CVE-2022-22947)☆11Apr 15, 2022Updated 4 years ago
- Public exploits (re)writed while learning.☆14Aug 7, 2013Updated 12 years ago
- Collection of ezine about virii☆17Sep 13, 2022Updated 3 years ago
- Decrypted content of eqgrp-auction-file.tar.xz☆4,198May 24, 2017Updated 8 years ago
- Exploiting ring0 memcpy-like functionality to disable Driver Signing Enforcement (DSE)☆19Apr 12, 2020Updated 6 years ago
- Exploits USB HID to steal passwords saved in Google Chrome☆70Sep 17, 2017Updated 8 years ago
- Code for testing krackattacks☆10Oct 18, 2017Updated 8 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- GUI Tool to generate threat intelligence information in various formats☆45Jan 18, 2018Updated 8 years ago
- ☆35Feb 9, 2018Updated 8 years ago
- Schematics & Firmware for self-tuning portable RF Jammer☆12Feb 2, 2018Updated 8 years ago
- WPA/WPA2 Belkin.XXXX, Belkin_XXXXXX, belkin.xxx and belkin.xxxx router default key generator.☆15May 13, 2015Updated 10 years ago
- HAT project is specially created to install latest update of Metasploit Framework & to install all required Reverse Engineer Tools with r…☆13Oct 28, 2019Updated 6 years ago
- H2HC 2018 Slides/Materials/Presentations☆36Nov 24, 2020Updated 5 years ago
- Toolkit Hacking☆70Jan 6, 2023Updated 3 years ago
- SuperNES - Super Nmap Easy Scanner☆10Oct 2, 2018Updated 7 years ago
- A brief analysis of the BlueBorne Vulnerability Scanner app by Armis☆23Sep 14, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Counter Surveillance and OPSEC research☆110Apr 2, 2025Updated last year
- his program shows you IMSI numbers, country, brand and operator of cellphones around you. /!\ This program was made to understand how GS…☆13Dec 27, 2018Updated 7 years ago
- A lightweight python system dashboard written in cherry py delivered over the web.☆10Apr 16, 2026Updated 2 weeks ago
- This is a simple but very powerful sms spamming program that is coded in visual basic. I could not find a program for my needs with no vi…☆12May 24, 2013Updated 12 years ago
- Malicious Software SRC Extract☆31Jan 2, 2023Updated 3 years ago
- 🔵 ethereum grid trading bot☆36Oct 10, 2025Updated 6 months ago
- Code and articles associated with my Wikileaks research project, but could applicable to reading up on any item in the news and visualizi…☆21Apr 4, 2015Updated 11 years ago