NSA documents in machine readable form
☆96Jun 5, 2018Updated 7 years ago
Alternatives and similar repositories for NSA-Data
Users that are interested in NSA-Data are comparing it to the libraries listed below
Sorting:
- Intuitive and configurable search interface for document archives.☆199Nov 11, 2019Updated 6 years ago
- Communicate with government surveillance programs via your metadata.☆26Oct 9, 2018Updated 7 years ago
- TXT and PDF documents from the NSA☆188Mar 24, 2015Updated 10 years ago
- Every document published from the Snowden archive☆73Apr 7, 2015Updated 10 years ago
- Java integration for Hex-Rays IDA Pro☆26Feb 15, 2017Updated 9 years ago
- OS X rootkit loader version #2☆12Apr 9, 2015Updated 10 years ago
- A D3 module for creating London Squared cartograms☆11Jan 7, 2023Updated 3 years ago
- Resume data and scripts for managing it☆92Feb 5, 2017Updated 9 years ago
- ☆12May 6, 2020Updated 5 years ago
- Dataspec for SII☆10Jan 4, 2017Updated 9 years ago
- Snowden Archive: The SIDtoday Files☆408May 30, 2019Updated 6 years ago
- A certificate generator/manager for the WiFi Pineapple NANO and TETRA☆12Jul 18, 2020Updated 5 years ago
- PEAnalyser is an open source PE file analysis tool.☆11Oct 26, 2020Updated 5 years ago
- SDK-SMS-Stack☆28Jan 4, 2023Updated 3 years ago
- ZigBee hacking tools and scripts☆14Mar 25, 2018Updated 7 years ago
- A fake login page for use in a phishing attack☆35Mar 21, 2017Updated 8 years ago
- Web crawling and document processing through a usable interface.☆72Jul 22, 2017Updated 8 years ago
- Wheel spokes tension simulator in Unity☆17Jul 22, 2018Updated 7 years ago
- A standalone addon for GnuPG☆18Nov 25, 2018Updated 7 years ago
- A python library to automate time-based blind SQL injection☆49Sep 15, 2019Updated 6 years ago
- CVE-2017-4878 Samples - http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html☆18Feb 5, 2018Updated 8 years ago
- Thrift on Netty 4.x && Thrift Client Pool☆16Dec 26, 2016Updated 9 years ago
- Meteor based NSA items database and vizualisation☆22Feb 22, 2015Updated 11 years ago
- Example crypter is a project demonstrating how files can be encrypted and injected into memory using a stub file.☆17Oct 10, 2016Updated 9 years ago
- An overview of the important facts in the Apple vs. FBI case☆19Mar 28, 2023Updated 2 years ago
- Social Toolkit for Phishing Attacks (Cross-Plataform)☆21Sep 26, 2016Updated 9 years ago
- Source code of "Dezhou Instrumentz" challenge from RealWorldCTF 2019 quals☆24Jan 3, 2021Updated 5 years ago
- Tracks runtime instruction execution in Linux programs☆36Aug 25, 2013Updated 12 years ago
- CSRF Scanner Extension for Burp Suite Pro☆20Jun 5, 2018Updated 7 years ago
- RCS Soldier for Windows☆78Jul 6, 2015Updated 10 years ago
- PAnalizer is a forensic tool, you can search pornographic images in a specific directory, this is util in Pedestrian Detection. Also you …☆45May 6, 2019Updated 6 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆21Feb 5, 2017Updated 9 years ago
- A simple Shellshock scanner in python☆39Oct 12, 2014Updated 11 years ago
- Brute Force Attack 3 ^ 8 Remote Control☆28Feb 26, 2017Updated 9 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Nov 2, 2016Updated 9 years ago
- A DLL that performs IAT hooking☆27Jul 6, 2018Updated 7 years ago
- ☆25Jul 8, 2015Updated 10 years ago
- Official Documentation for the Bilaxy APIs and Websockets.☆11Jan 6, 2021Updated 5 years ago
- Arduino Rubber Ducky Framework☆107Apr 29, 2019Updated 6 years ago