Every document published from the Snowden archive
☆74Apr 7, 2015Updated 11 years ago
Alternatives and similar repositories for NSA-Stories
Users that are interested in NSA-Stories are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Signed list of OpenPGP fingerprints for First Look employees☆15Feb 3, 2025Updated last year
- Snowden Archive: The SIDtoday Files☆405May 30, 2019Updated 6 years ago
- FIREWALL EXPLOITS COPY OF NSA EQUATION GROUP SHADOW BROKERS☆20Sep 22, 2016Updated 9 years ago
- This semester we will work together to gather, analyze and visualize numbers you need to understand your audience and to tell interactive…☆17Oct 5, 2018Updated 7 years ago
- TXT and PDF documents from the NSA☆190Mar 24, 2015Updated 11 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- lessons I am learning☆14Oct 24, 2019Updated 6 years ago
- NSA documents in machine readable form☆97Jun 5, 2018Updated 7 years ago
- Generate structured SVG from TopoJSON☆24Jul 29, 2016Updated 9 years ago
- 3D mesh of Snowden's Bust.☆28May 11, 2015Updated 11 years ago
- An opinionated guide to setting up and using PGP keys in a post-Snowden world☆15Jan 21, 2020Updated 6 years ago
- Materials for the PostgreSQL hands-on class at NICAR 2018 in Chicago.☆10Mar 10, 2018Updated 8 years ago
- EA game-friendly STL implementation. Obsoleted by official release.☆10Jul 20, 2014Updated 11 years ago
- A list of XMPP servers available as hidden services for use with the Prosody server and mod_onions☆18Oct 2, 2019Updated 6 years ago
- Group two-dimensional points into triangular bins.☆10Sep 26, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- NSA headline generator☆32Feb 11, 2014Updated 12 years ago
- parse uniform crime reporting clearance data☆13Oct 2, 2015Updated 10 years ago
- Code and data for the NICAR 2015 Advanced SQL with PostgreSQL hands-on class.☆13Mar 6, 2015Updated 11 years ago
- Familiarize yourself with GitHub and CLI and be happy. (CUNY-J teaching 2016)☆14May 31, 2016Updated 9 years ago
- Occupy WiFi Firmware☆11Sep 14, 2015Updated 10 years ago
- agent.btz download MALWARE BINARY PROVIDED + POC video☆23Jul 11, 2021Updated 4 years ago
- voodoo networking: post-VPN session obfuscation for a post-Snowden world☆33Jan 3, 2019Updated 7 years ago
- An IDA Pro plugin that sets up the addresses and structures for Cortex M series MCUs (currently stm32f2xx only)☆15Dec 7, 2018Updated 7 years ago
- Merges a microcontroller (Teensy w/Arduino) with a magstripe swiper☆23Apr 8, 2019Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Example data project for NICAR15 presentation☆13Mar 3, 2015Updated 11 years ago
- UNTESTED Reaver-WPS command-line for Android. Not proven to work with bcm4329 chipset based phones, but should probably do on bcm4330. RE…☆13May 17, 2014Updated 12 years ago
- Penetration testing bot for BeEF and Armitage/Cobalt Strike integration.☆23Jun 20, 2016Updated 9 years ago
- ELF binary infector☆33May 25, 2011Updated 14 years ago
- D3 plugin which computes a Voronoi tesselation where each cell defines a region inside a given distance☆28Aug 26, 2016Updated 9 years ago
- Cyber Attack Management for Metasploit☆13Jun 7, 2014Updated 11 years ago
- Code and articles associated with my Wikileaks research project, but could applicable to reading up on any item in the news and visualizi…☆21Apr 4, 2015Updated 11 years ago
- Using social media to steer web archiving and curation.☆18Nov 20, 2015Updated 10 years ago
- Simple tools for handling OOK (on-off-keyed) RF transmission/reception on ISM bands☆34Jan 6, 2014Updated 12 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Gather and compile open source threat intelligence feeds.☆39Feb 19, 2022Updated 4 years ago
- A phone CNAM lookup utility using the OpenCNAM API☆12Aug 15, 2014Updated 11 years ago
- ☆10Apr 26, 2016Updated 10 years ago
- Utility tool to help digitally sign applications (binaries) on Windows.☆13Jun 8, 2015Updated 10 years ago
- ☆11Nov 4, 2015Updated 10 years ago
- fuckNSA☆40Dec 5, 2013Updated 12 years ago
- Scripts and tools for ISM hacking☆16Mar 25, 2018Updated 8 years ago