kmbeck / Vault7DataLinks
Data retrieved via a quick & dirty web scraper. Currently contains the text data from each page that was dumped as of 2017-03-07. File names should roughly correspond with page names on wikileaks.
☆21Updated 8 years ago
Alternatives and similar repositories for Vault7Data
Users that are interested in Vault7Data are comparing it to the libraries listed below
Sorting:
- Commands to perform various activities related to penetration testing and red teaming☆20Updated 6 years ago
- wfuzz, SecLists and john -based dirbusting / forceful browsing script intended to be used during web pentest assingments☆41Updated 6 years ago
- FUZZBUNCH - NSA security tools☆81Updated 8 years ago
- Miscellaneous exploit code☆21Updated 9 years ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code.☆34Updated 9 years ago
- Metasploit/MSFVenom Payload Generator Stand Alone☆30Updated 8 years ago
- Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber☆61Updated 7 years ago
- PowerShell Reverse HTTPs Shell☆29Updated 11 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 8 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 6 years ago
- DHCP attack tool☆21Updated last year
- Windows Malware Probe of Concept☆21Updated 3 years ago
- Exploit for win10 SMB3.1☆18Updated 5 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆18Updated 10 years ago
- ☆15Updated 3 years ago
- Capture, upload and analyze network traffic; powered by PacketTotal.com.☆97Updated 5 years ago
- Android and iOS source for the Empire mobile app☆90Updated 6 years ago
- All tools you needed during penetration testing.☆18Updated 8 years ago
- Source codes of malwares, stress tests etc. for computer.☆38Updated 6 years ago
- Botnet Simulation Framework☆78Updated 5 years ago
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆50Updated last week
- PostShell - Post Exploitation Bind/Backconnect Shell☆83Updated 6 years ago
- Linux Rootkits (4.x Kernel)☆87Updated 4 years ago
- This is a malware repo. Use them at your own risk. This is strictly for educational purposes only.☆12Updated 6 years ago
- My public exploit collection.☆31Updated 7 years ago
- Collection of cracked malware☆15Updated 7 years ago
- Performance Monitor Volatile Environment LPE☆18Updated 7 months ago
- Malicious Software SRC Extract☆32Updated 3 years ago
- Papers, presentations and documents from the team at Hacker House.☆52Updated last week
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆19Updated 12 years ago