TXT and PDF documents from the NSA
☆190Mar 24, 2015Updated 11 years ago
Alternatives and similar repositories for documents
Users that are interested in documents are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Meteor based NSA items database and vizualisation☆22Feb 22, 2015Updated 11 years ago
- NSA documents in machine readable form☆97Jun 5, 2018Updated 7 years ago
- Every document published from the Snowden archive☆74Apr 7, 2015Updated 11 years ago
- fuckNSA☆40Dec 5, 2013Updated 12 years ago
- networked status aggregator sees all☆14Apr 26, 2021Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Quantum Insert/FoxAcid case study☆16May 18, 2017Updated 9 years ago
- Snowden Archive: The SIDtoday Files☆406May 30, 2019Updated 6 years ago
- FUZZBUNCH - NSA security tools☆82Apr 16, 2017Updated 9 years ago
- Double pulsar tool of NSA leaked by SHADOW BROKERS☆15Jun 16, 2017Updated 8 years ago
- ☆10Apr 2, 2022Updated 4 years ago
- iSEC Partners' research publications☆77Jul 8, 2016Updated 9 years ago
- Digital Forensics and Incident Response Wiki☆40May 19, 2014Updated 12 years ago
- ☆20Feb 23, 2019Updated 7 years ago
- Standalone VPN/Tor WiFi router for journalists and activists☆48Mar 3, 2016Updated 10 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Monitor JSON notifications feed from VT☆17Jun 13, 2017Updated 8 years ago
- Time managing app.☆10Jun 8, 2015Updated 10 years ago
- CFE virtual competition framework☆14Feb 1, 2017Updated 9 years ago
- A TrustedBSD module to control execution of binaries with suid bit set☆38Oct 3, 2014Updated 11 years ago
- misc scripts☆35Oct 23, 2018Updated 7 years ago
- Dorker, programa utilizado para automatizar pesquisas em buscadores, faz uso de alguns filtros.☆16Feb 6, 2016Updated 10 years ago
- Thanos is a tool made for scan a range of IP's and get the banners of the running services. The main function is do banner grabber, but y…☆46Jul 2, 2016Updated 9 years ago
- ☆35Jun 4, 2018Updated 7 years ago
- Optional plugins for MITMf☆17Dec 16, 2014Updated 11 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Openfst mirror with some fixes☆15Aug 23, 2024Updated last year
- System Processes Correlation Engine☆19Jan 2, 2024Updated 2 years ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆17Nov 29, 2017Updated 8 years ago
- Slides, codes, and materials related to my courses☆16Dec 19, 2025Updated 5 months ago
- Simple script to automated the capture and merging process when using a hardware TAP☆15Mar 7, 2013Updated 13 years ago
- This is the code for the fault injection tutorial I wrote. Read the README for more information.☆13Feb 27, 2014Updated 12 years ago
- Search inside Snowden/NSA/GCHQ/whatever documents☆11Jul 11, 2014Updated 11 years ago
- NSArray utilities☆74Mar 27, 2014Updated 12 years ago
- Generic script to load ipsets from iblocklist.com☆14Jun 7, 2017Updated 8 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- CRITs IOC Visualization in Maltego☆28Jan 8, 2015Updated 11 years ago
- Metasploit Usage Wiki☆48Feb 26, 2015Updated 11 years ago
- security in a box - tools and tactics for your digital security☆20May 4, 2015Updated 11 years ago
- U.R.G.E. Universal Rapid Gamma Emitter (twitter edition)☆18Sep 17, 2011Updated 14 years ago
- The goal of this project is to examine, reverse, and document the different modules available in the Equation Group's DanderSpritz post-e…☆334Jun 23, 2018Updated 7 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆37Nov 22, 2015Updated 10 years ago
- Author: Vitali Kremez. [Targets the following POS malware: *POSCardStealer.O *Dexter *Alina *POSmalware *JackPos *BlackPOS] [Function: C…☆22Mar 30, 2018Updated 8 years ago