TransparencyToolkit / NSA-DataLinks
NSA documents in machine readable form
☆96Updated 6 years ago
Alternatives and similar repositories for NSA-Data
Users that are interested in NSA-Data are comparing it to the libraries listed below
Sorting:
- Resume data and scripts for managing it☆91Updated 8 years ago
- ☆31Updated 5 years ago
- Every document published from the Snowden archive☆68Updated 10 years ago
- Hacker OPSEC☆96Updated 7 years ago
- INACTIVE - http://mzl.la/ghe-archive - Some good software for those concerned about their OPSEC. Geared towards journalists, but good fo…☆95Updated 6 years ago
- Satellite: Measuring The Internet's Stars☆38Updated 4 years ago
- Web crawling and document processing through a usable interface.☆72Updated 7 years ago
- Intuitive and configurable search interface for document archives.☆204Updated 5 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆101Updated 8 years ago
- The Digital First Aid Kit has moved to Gitlab:☆109Updated 5 years ago
- HTTPS Everywhere rulesets for hidden services and eepsites.☆168Updated 7 years ago
- Library and tools to interact with and analyze Tor HSDirs.☆73Updated 9 years ago
- usbWatchdog - monitor changes to your usb ports, and if anything is plugged in or removed, wipe RAM and shut down.☆50Updated 8 years ago
- Android wireless karma attack detector☆66Updated 9 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- An attempt to document commonly believed misconceptions about Tor.☆14Updated 7 years ago
- Local and Remote Maltego Rapid Transform Development Framework☆102Updated 8 years ago
- Standalone VPN/Tor WiFi router for journalists and activists☆48Updated 9 years ago
- Top Level Domain data☆66Updated 5 years ago
- ☆62Updated 11 years ago
- PORTAL of Pi - RaspberyPi based PORTAL device. Certified UNIX Network Technicians only!☆334Updated 7 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- Script to silently intercept SSL on computers infected with Superfish malware☆28Updated 10 years ago
- iSEC Partners' research publications☆76Updated 8 years ago
- Python malware for pentesters that bypasses most antivirus (signature and heuristics) and IPS using sheer stupidity☆76Updated 11 years ago
- ☆198Updated 9 years ago
- Modified version of Tor and associated tools for investigating the Hidden Service DHT. This research is old. Lots of work is being done t…☆11Updated 9 years ago
- Data package with attacks against civil society☆13Updated 8 years ago
- Open source Android, iOS and Web app for learning about and managing digital and physical security. From how to send a secure message to …☆68Updated 2 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago