nsa-observer / documentsLinks
TXT and PDF documents from the NSA
☆189Updated 10 years ago
Alternatives and similar repositories for documents
Users that are interested in documents are comparing it to the libraries listed below
Sorting:
- Panic button for protection against cold boot attacks☆145Updated 3 years ago
- NSA documents in machine readable form☆97Updated 7 years ago
- Shodan Firefox Add-on☆153Updated 4 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆145Updated 10 years ago
- Hacker OPSEC☆99Updated 7 years ago
- A fast and modular scanner for Tor exit relays. The canonical repository (including issue tracker) is at https://gitlab.torproject.org/tp…☆460Updated last year
- A honeypot for malware that propagates via USB storage devices☆100Updated 10 years ago
- HTTPS Everywhere rulesets for hidden services and eepsites.☆170Updated 8 years ago
- Script to bootstrap a Debian server to be a set-and-forget Tor relay☆145Updated 2 years ago
- Scalpel; File Carving. Configuration files are modified.☆121Updated 12 years ago
- ☆382Updated 13 years ago
- Snowden Archive: The SIDtoday Files☆410Updated 6 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 10 years ago
- Automatically exported from code.google.com/p/jsunpack-n☆165Updated 10 years ago
- Collection of IOCs related to targeting of civil society☆189Updated 3 years ago
- Every document published from the Snowden archive☆70Updated 10 years ago
- Monitoring 'DNS' inside the Tor network☆93Updated 8 years ago
- Anti-forensic monitor program: watches for signs of tampering and purges keys/shuts everything down.☆30Updated 9 years ago
- VirusTotal tools☆92Updated 4 years ago
- The Digital First Aid Kit has moved to Gitlab:☆110Updated 6 years ago
- Citizen Lab Malware Reports☆276Updated 4 years ago
- Library and tools to interact with and analyze Tor HSDirs.☆73Updated 9 years ago
- pastebin.com Content Monitoring Tool☆194Updated 12 years ago
- OS Fingerprint Obfuscation for modern Linux Kernels☆77Updated last year
- Config generator for chaos vpn☆123Updated 3 years ago
- Twitter as an extra entropy source☆104Updated 7 years ago
- Detect and prevent KRACK attacks in your network☆182Updated 7 years ago
- Decryption Tool☆146Updated 6 years ago
- ☆37Updated 10 years ago
- Meteor based NSA items database and vizualisation☆21Updated 10 years ago