kmbeck / Vault7Data
Data retrieved via a quick & dirty web scraper. Currently contains the text data from each page that was dumped as of 2017-03-07. File names should roughly correspond with page names on wikileaks.
☆21Updated 7 years ago
Alternatives and similar repositories for Vault7Data:
Users that are interested in Vault7Data are comparing it to the libraries listed below
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.☆28Updated 6 years ago
- Various Crypter Project☆9Updated 11 years ago
- Windows Malware Probe of Concept☆21Updated 2 years ago
- Repository of tools used in my blog☆50Updated 11 months ago
- TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Head…☆19Updated 4 years ago
- Exploit Pack - One step ahead☆11Updated 11 years ago
- Vault 7: CIA Hacking Tools Revealed☆15Updated 7 years ago
- Mass malicious script dump/Malware src dump☆15Updated 8 years ago
- Fresh malware samples caught in the wild daily from random places. 🎣☆18Updated 5 years ago
- Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devices☆22Updated 7 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- Example of malicious codes for educational purpose, don't make shit with that☆28Updated 6 years ago
- A Botnet builder built on Elasticsearch and Kibana with the help of C++ and Python3☆22Updated 4 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆28Updated 9 months ago
- ☆16Updated 6 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 11 years ago
- PowerShell Reverse HTTPs Shell☆26Updated 10 years ago
- iOS malware samples☆43Updated 8 years ago
- Automated Payload Test Controller☆9Updated 7 years ago
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆46Updated 4 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- Shock the shell! Exploit many injection method for shellshock☆18Updated 6 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 7 years ago
- ☆13Updated 4 years ago
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆22Updated 7 years ago
- SideEffect Keylogger☆13Updated 8 years ago
- Operation Fast Cash - Hidden Cobra‘s AIX PowerPC malware dissected☆25Updated 6 years ago
- NOT MY CODE! Zeus trojan horse - leaked in 2011, I am not the author. I have created this repository to make the access for study as easy…☆22Updated 7 years ago
- Darknet botnet/worm aims to be a distributed anonymous P2P-based simple botnet written in Assembly☆35Updated 11 years ago
- Telnet-2 allows to connect via Tor and define a custom timeout☆10Updated 5 years ago