TransparencyToolkit / NSA-Data
NSA documents in machine readable form
☆92Updated 6 years ago
Alternatives and similar repositories for NSA-Data:
Users that are interested in NSA-Data are comparing it to the libraries listed below
- Resume data and scripts for managing it☆89Updated 8 years ago
- Every document published from the Snowden archive☆66Updated 9 years ago
- Web crawling and document processing through a usable interface.☆71Updated 7 years ago
- ☆31Updated 4 years ago
- Intuitive and configurable search interface for document archives.☆200Updated 5 years ago
- An attempt to document commonly believed misconceptions about Tor.☆14Updated 7 years ago
- Hacker OPSEC☆95Updated 6 years ago
- The Digital First Aid Kit has moved to Gitlab:☆109Updated 5 years ago
- Library and tools to interact with and analyze Tor HSDirs.☆73Updated 8 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- Local and Remote Maltego Rapid Transform Development Framework☆103Updated 8 years ago
- Android wireless karma attack detector☆66Updated 9 years ago
- Broadcast Anonymous Routing - A scalable system for efficient anonymous communications☆76Updated 8 years ago
- Standalone VPN/Tor WiFi router for journalists and activists☆48Updated 8 years ago
- Script to silently intercept SSL on computers infected with Superfish malware☆28Updated 10 years ago
- Grab files matching a search specification from Github☆110Updated 4 years ago
- PORTAL of Pi - RaspberyPi based PORTAL device. Certified UNIX Network Technicians only!☆332Updated 7 years ago
- ☆37Updated 10 years ago
- Satellite: Measuring The Internet's Stars☆37Updated 4 years ago
- Sensor software☆66Updated 3 years ago
- INACTIVE - http://mzl.la/ghe-archive - Some good software for those concerned about their OPSEC. Geared towards journalists, but good fo…☆95Updated 5 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆101Updated 8 years ago
- iSEC Partners' research publications☆76Updated 8 years ago
- Offensives network security framework for Wireless and MiTM style hacking☆60Updated 7 years ago
- Quickly add disruptive unicode, dangerous strings, and more to your clipboard.☆25Updated 8 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 8 years ago
- ☆54Updated 11 years ago
- Code release for: Cookies that give you away: The surveillance implications of web tracking☆53Updated 6 years ago
- irc bot to scan & bruteforce ssh/telnet☆7Updated 5 years ago