NSA documents in machine readable form
☆96Jun 5, 2018Updated 7 years ago
Alternatives and similar repositories for NSA-Data
Users that are interested in NSA-Data are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Intuitive and configurable search interface for document archives.☆199Nov 11, 2019Updated 6 years ago
- Dataspec for SII☆10Jan 4, 2017Updated 9 years ago
- TXT and PDF documents from the NSA☆189Mar 24, 2015Updated 11 years ago
- Communicate with government surveillance programs via your metadata.☆27Oct 9, 2018Updated 7 years ago
- Resume data and scripts for managing it☆92Feb 5, 2017Updated 9 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Every document published from the Snowden archive☆74Apr 7, 2015Updated 11 years ago
- Extract Firefox bookmarks from places.sqlite found in user profiles. Returns CSV data containing: timestamp of last modification, profile…☆29Nov 6, 2016Updated 9 years ago
- Access My Info Frontend☆12Oct 16, 2019Updated 6 years ago
- Its the programmed ATM card that can hack into all ATM machines. Its works with any currency and in any country where you might be living…☆10May 15, 2016Updated 9 years ago
- Web crawling and document processing through a usable interface.☆72Jul 22, 2017Updated 8 years ago
- Snowden Archive: The SIDtoday Files☆406May 30, 2019Updated 6 years ago
- security in a box - tools and tactics for your digital security☆20May 4, 2015Updated 10 years ago
- Registry Based Artifact Collection and Correlation☆10Aug 18, 2015Updated 10 years ago
- Java integration for Hex-Rays IDA Pro☆26Feb 15, 2017Updated 9 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Meteor based NSA items database and vizualisation☆22Feb 22, 2015Updated 11 years ago
- a collection of public domain artwork and graphics, where possible, with source files to help others remix and reuse to make slides, hand…☆30Aug 19, 2018Updated 7 years ago
- HACK ATM MACHINES NEAREST TO YOU AND BECOME RICH!!! You can hack and break into a bank’s security ATM Machine without carrying guns or an…☆19Sep 14, 2016Updated 9 years ago
- U.R.G.E. Universal Rapid Gamma Emitter (twitter edition)☆18Sep 17, 2011Updated 14 years ago
- Turn your two-bit doodles into fine artworks with deep neural networks, generate seamless textures from photos, transfer style from one i…☆11May 7, 2016Updated 9 years ago
- OS X rootkit loader version #2☆12Apr 9, 2015Updated 11 years ago
- Gambling webpage with a three-layer architecture and client-server based. Languages used: JAVA for the backend and HTML, CSS, JS and JQue…☆11Nov 8, 2019Updated 6 years ago
- A simple Shellshock scanner in python☆39Oct 12, 2014Updated 11 years ago
- This repository provides a comprehensive guide for controlling motors and sensors using Arduino, Raspberry Pi, and ESP boards. Step-by-st…☆15Feb 9, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A fake login page for use in a phishing attack☆35Mar 21, 2017Updated 9 years ago
- UNTESTED Reaver-WPS command-line for Android. Not proven to work with bcm4329 chipset based phones, but should probably do on bcm4330. RE…☆13May 17, 2014Updated 11 years ago
- TLS Report☆25Aug 9, 2020Updated 5 years ago
- Automated Twitter bots, run by the artificial artificial intelligence of Amazon Mechanical Turk.☆32Dec 23, 2010Updated 15 years ago
- a collection of flyers and, where possible, their source files to help others make new cryptoparty flyers☆28Jul 8, 2024Updated last year
- Give the NSA free backdoor access to your Flask app.☆187Jun 11, 2013Updated 12 years ago
- A certificate generator/manager for the WiFi Pineapple NANO and TETRA☆12Jul 18, 2020Updated 5 years ago
- CVE-2017-4878 Samples - http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html☆18Feb 5, 2018Updated 8 years ago
- ☆16Oct 29, 2018Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Porting the Pineapple to the Raspberry Pi☆85Jun 27, 2013Updated 12 years ago
- TT RSS Paper Theme☆17Jan 27, 2016Updated 10 years ago
- PGP web-app that verifies signed ascii armor messages automatically.☆11Jul 6, 2023Updated 2 years ago
- FIREWALL EXPLOITS COPY OF NSA EQUATION GROUP SHADOW BROKERS☆20Sep 22, 2016Updated 9 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Nov 2, 2016Updated 9 years ago
- A simple indicator for Guake/Guake3 terminal☆11Feb 25, 2021Updated 5 years ago
- generic LP decrypter 1: functions of two runes☆10Aug 25, 2022Updated 3 years ago