al1ce23 / NSA-PlaysetLinks
Mirror of the NSA Playset Project
☆45Updated 7 years ago
Alternatives and similar repositories for NSA-Playset
Users that are interested in NSA-Playset are comparing it to the libraries listed below
Sorting:
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 3 years ago
- A Jupyter Notebook Program To Visualize Your WiGLE Wardriving Data☆18Updated 4 years ago
- Various analysis of Android stalkerware☆116Updated 5 years ago
- The hacker technical cheat sheet☆43Updated 6 months ago
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆121Updated 2 years ago
- OSINT VM based on Open Source Intelligence Techniques 7th Edition☆66Updated 5 years ago
- Collection of osint related links original posted by Tr1gger on raidforums.com which Tr1gger had copied from the @i_intelligence handbook☆20Updated 7 years ago
- OSINT webcam mapping project☆91Updated 8 years ago
- Source of swisskyrepo.github.io - Public☆26Updated 6 months ago
- Random files such as wordlists which maybe be useful for playing our game☆23Updated 5 months ago
- Malicious Link Blog☆25Updated 2 years ago
- ☆11Updated 3 years ago
- Covert data exfiltration and detection using 802.11 beacon stuffing☆16Updated 6 years ago
- Maltego Transforms for WhatsMyName☆66Updated 2 years ago
- Simple FREE guide to set up TOR stealth and persistence with complete anonymity.☆62Updated 2 months ago
- Apple BLE research☆31Updated 6 years ago
- a collection of payloads and scripts from my "Building an Ethical Hacker EDC" YouTube Series☆28Updated 4 years ago
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆29Updated 7 years ago
- Awesome-Cellular-Hacking☆71Updated 4 years ago
- Are.We.Secure.Yet Framework aims to test the wifi security of a location, attempting to locate individual devices☆41Updated 2 years ago
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC☆63Updated 2 years ago
- SkeletonKey is capable of advanced encryption, decryption, and breaking ciphers through various methods. These methods include but are no…☆45Updated 2 years ago
- Basics on commands/tools/info on how to do a forensic analysis of a mobile phone☆30Updated 2 years ago
- List of sources for cybersecurity news☆41Updated 3 years ago
- Venmo: Open Source Intelligence Investigation Tool☆56Updated 5 years ago
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆109Updated 2 years ago
- A Python3 powered bash script written to slightly automate the tool installation process of the Hacker Playbook Book (http://thehackerpla…☆40Updated 6 years ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆16Updated 2 years ago
- Curated archive of tools from the Wikileaks CIA hacking tool leak, pull requests welcome https://wikileaks.org/ciav7p1/☆125Updated 8 years ago
- ☆22Updated 9 years ago