DonnchaC / cia-hacking-tool-archive
Curated archive of tools from the Wikileaks CIA hacking tool leak, pull requests welcome https://wikileaks.org/ciav7p1/
☆121Updated 8 years ago
Alternatives and similar repositories for cia-hacking-tool-archive:
Users that are interested in cia-hacking-tool-archive are comparing it to the libraries listed below
- Intelligence and Reconnaissance Package/Bundle installer.☆238Updated 4 years ago
- Multiplatform payload dropper☆273Updated 3 years ago
- An automated Wireless RogueAP MITM attack framework.☆185Updated 5 years ago
- An open source RansomWare☆87Updated 5 years ago
- A collection of fraud related tools for research.☆148Updated 5 years ago
- WikiLeaks Vault 7 CIA Hacking Tools☆179Updated last year
- Get your USB Rubber Ducky up and running faster☆42Updated 7 years ago
- A ctypes powered python keylogger.☆105Updated 5 years ago
- Advanced Hash Manipulation☆178Updated 5 years ago
- Dangerous Malwares☆204Updated 8 years ago
- HTTP botnet☆61Updated 8 years ago
- The Collective. A repo for a collection of red team and/or pen test projects found mostly on Github. https://github.com/ceramicskate0/The…☆35Updated 5 years ago
- Simple security surveillance script for linux distributions.☆59Updated 8 years ago
- This is a collection of social engineering tricks and payloads being used for credential theft and spear phishing attacks.☆345Updated 7 years ago
- Exploit pack for pentesters and ethical hackers.☆115Updated 8 years ago
- Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android), multi function RAT (Remote Administration Tool) mainly written in p…☆86Updated 7 years ago
- OSINT tool for testing privacy and social engineering vulnerability of organizations.☆92Updated 5 years ago
- Plugins for the King Phisher open source phishing campaign toolkit.☆83Updated 4 years ago
- Python script that will extract all saved passwords from your google chrome database on windows only☆74Updated 4 years ago
- FireShodanMap is a Realtime map that integrates Firebase, Google Maps and Shodan. A search is carried out using Shodan searching vulnerab…☆126Updated 6 years ago
- Command line go0gle dorking tool☆138Updated 11 years ago
- Social engineering tool for human hacking☆120Updated 8 years ago
- USB-Rubber-Ducky Payload - Mimikatz in Memory w UAC Bypass☆35Updated 9 years ago
- Exploitkit☆184Updated 8 years ago
- PoC Android smart phone botnet☆78Updated 12 years ago
- FUZZBUNCH - NSA security tools☆73Updated 8 years ago
- Pythonic ransomware proof of concept.☆218Updated 4 years ago
- ☆58Updated 7 years ago
- Penetration testing bot for BeEF and Armitage/Cobalt Strike integration.☆22Updated 8 years ago
- A Phishing Dropper designed to Pentest.☆273Updated 7 years ago