netwrkspider / vault7CIAwikileaksView external linksLinks
Vault 7: CIA Hacking Tools Revealed
☆17Mar 8, 2017Updated 8 years ago
Alternatives and similar repositories for vault7CIAwikileaks
Users that are interested in vault7CIAwikileaks are comparing it to the libraries listed below
Sorting:
- Doorbell replay attack using Arduino and HackRF One☆11Feb 15, 2021Updated 4 years ago
- A collection of personal ZAP scripts☆13Apr 10, 2023Updated 2 years ago
- Photo forensics tool that detects alteration of JPEG images☆10May 13, 2021Updated 4 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Aug 31, 2019Updated 6 years ago
- Transform EQL detection rules to VQL artifacts☆12Nov 12, 2021Updated 4 years ago
- Prototype for an in memory fuzzer☆13Aug 1, 2017Updated 8 years ago
- FAUCET is an OpenFlow controller for multi table OpenFlow 1.3 switches, that implements layer 2 switching, VLANs, ACLs, and layer 3 IPv4 …☆14Nov 18, 2019Updated 6 years ago
- ☆11Apr 2, 2022Updated 3 years ago
- Error Level Analysis (ELA) in ImageJ☆10Oct 17, 2019Updated 6 years ago
- ☆15Aug 13, 2014Updated 11 years ago
- How can you track the hunting techniques you come up with?☆13Sep 3, 2017Updated 8 years ago
- A powershell script for creating a Windows honeyport.☆12Jun 24, 2015Updated 10 years ago
- NSA tool hacking☆15May 20, 2018Updated 7 years ago
- ☆12Jul 15, 2018Updated 7 years ago
- An anti DDoS tool that tries to neutralize proxies denial of service. Created in 2016.☆10Oct 2, 2016Updated 9 years ago
- a port made of honey for blocking people☆13Jun 24, 2020Updated 5 years ago
- Bad bad bad bad bad stuff☆11Jun 10, 2019Updated 6 years ago
- Hack Facebook☆16Nov 29, 2022Updated 3 years ago
- ☆12Aug 23, 2019Updated 6 years ago
- c++ implementation of a simple-virtual-machine☆14Sep 19, 2014Updated 11 years ago
- Collection of red team scripts, resources & configs.☆15May 9, 2025Updated 9 months ago
- Reverse Shell troll software☆12Sep 24, 2019Updated 6 years ago
- Work files for my blog post "Code Caving in a PE file.☆16Dec 18, 2016Updated 9 years ago
- Phone Number Gathering & OSINT Tool. Collects Phone Numbers and Performs OSINT on the Numbers. Only works on Nigerian Numbers at the mome…☆14Aug 25, 2020Updated 5 years ago
- c programming☆10Oct 31, 2020Updated 5 years ago
- Rabbit in Python☆11Mar 20, 2018Updated 7 years ago
- Command-line tool to format and syntax highlight Suricata rules☆13Nov 30, 2019Updated 6 years ago
- Hack.co.za old website mirror☆12Oct 30, 2017Updated 8 years ago
- A collection of blockchain study materials☆11Sep 23, 2017Updated 8 years ago
- Create shellcode from executable or assembly code☆12Jul 31, 2017Updated 8 years ago
- ☆13Oct 14, 2017Updated 8 years ago
- NSA Hacking Tool Recreation UnitedRake☆13Jul 11, 2019Updated 6 years ago
- Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability☆10Sep 1, 2018Updated 7 years ago
- UI used to manage Permanent WMI Event Consumers☆14Mar 21, 2015Updated 10 years ago
- Electrum server for Litecoin☆16May 15, 2021Updated 4 years ago
- Tool to display a Windows 8+ process mitigation policy☆12Jul 9, 2025Updated 7 months ago
- Privilege escalation to root using sudo chroot, NO NEED for gcc installed.☆45Oct 6, 2025Updated 4 months ago
- 🏦 Finance utility for Bitstamp☆14Sep 10, 2017Updated 8 years ago
- ☆16Apr 16, 2017Updated 8 years ago