TXT and PDF documents from the NSA
☆15Mar 24, 2015Updated 11 years ago
Alternatives and similar repositories for documents
Users that are interested in documents are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This guide details the planning and the tools involved in creating a secure Linux production systems - work in progress.☆19Feb 1, 2019Updated 7 years ago
- Mirror of self-tuning portable RF jammer☆25Feb 2, 2018Updated 8 years ago
- Burp suite - Python☆19Nov 2, 2018Updated 7 years ago
- Facebook Basic Pro Scame Page☆17Nov 7, 2017Updated 8 years ago
- Hacking Html Index For Web Site☆15Nov 8, 2017Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A python script that finds endpoints in JavaScript files☆10Nov 29, 2019Updated 6 years ago
- ☆43Jul 23, 2018Updated 7 years ago
- ☆14Jun 2, 2025Updated 11 months ago
- Skeleton (but pronounced like Peloton): A Zero-Click RCE exploit for CVE-2021-0326☆21Mar 16, 2022Updated 4 years ago
- Popping boxes with Nmap☆18Apr 16, 2012Updated 14 years ago
- Simple tools to handle string and generate subdomain permutations☆15Jun 8, 2022Updated 3 years ago
- Training for Golang (go language)☆10Mar 29, 2019Updated 7 years ago
- Tool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other Linux based systems. using Tool-X you can install al…☆15May 17, 2020Updated 5 years ago
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆13Mar 20, 2024Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15May 29, 2015Updated 10 years ago
- Seven different DLL injection techniques in one single project.☆12May 19, 2020Updated 5 years ago
- Gets the name of all currently running process then checks them against a list of known defensive products such as AV's, EDR's and loggin…☆14Oct 8, 2022Updated 3 years ago
- A simplistic but fast Web Content Scanner written in nodejs.☆11Jun 5, 2025Updated 10 months ago
- Golang bindings for macOS / OS X libproc☆15Jan 20, 2018Updated 8 years ago
- Automated PowerShell installer for *Nix with multi Distro support.☆20Nov 21, 2018Updated 7 years ago
- Accompanying code for blog post "Mapping iOS Persistence Attack Surface using Corellium"☆11Jun 10, 2025Updated 10 months ago
- The utility aims to clean up output generated by popular tools by calculating a hash based on specific JSON values to removing junk data.☆16Apr 5, 2024Updated 2 years ago
- List all tracks of an artist ranked by poularity at http://localhost:3000/tracks/{artistName}☆10Sep 24, 2015Updated 10 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A React component which can parse JSX and output rendered React Components.☆16May 21, 2019Updated 6 years ago
- HTB Jail Remote Exploit By Cneeliz - 2017☆15Jan 9, 2018Updated 8 years ago
- A Powershell script that looks for specific emails in an exchange users mailbox, downloads the attachments, then marks those emails as re…☆17Apr 22, 2024Updated 2 years ago
- WPScan is a black box WordPress vulnerability scanner.☆10Oct 6, 2017Updated 8 years ago
- Tool to remove unsupported arm64e slice from a dylib based on the iOS version☆12Dec 21, 2022Updated 3 years ago
- This program show you IMSI numbers of cellphones around you.☆13Dec 14, 2017Updated 8 years ago
- Leveraging it is a simple matter of presenting the server with the SSH2_MSG_USERAUTH_SUCCESS message, which shows that the login already…☆14Oct 17, 2018Updated 7 years ago
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆13Nov 1, 2023Updated 2 years ago
- CVE-2018-4407 IOS/macOS kernel crash☆13Feb 23, 2019Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Collection of useful Ghidra utilities and references☆14Apr 9, 2024Updated 2 years ago
- Matrix digital rain in P5.JS & Canvas☆11Sep 22, 2019Updated 6 years ago
- A ruby self contained, low resource consuming HTTP transparent proxy designed for the WiFi Pineapple MKV.☆17Jun 29, 2015Updated 10 years ago
- Spy on your friend Android App☆13Feb 13, 2017Updated 9 years ago
- HackSys Extreme Vulnerable Driver - Various Windows 7 x86 Kernel Exploits☆21Jan 13, 2018Updated 8 years ago
- Remote Access Trojan for Chrome and Firefox. It's pretty ugly right now.☆15Sep 9, 2012Updated 13 years ago
- PHP dynamic image IP logger utilizing htaccess mod_rewrite.☆12Sep 23, 2018Updated 7 years ago