TXT and PDF documents from the NSA
☆188Mar 24, 2015Updated 10 years ago
Alternatives and similar repositories for documents
Users that are interested in documents are comparing it to the libraries listed below
Sorting:
- Every document published from the Snowden archive☆73Apr 7, 2015Updated 10 years ago
- NSA documents in machine readable form☆96Jun 5, 2018Updated 7 years ago
- Mirror of http://rafale.org/~mattoufoutu/darkc0de.com☆13Jul 25, 2015Updated 10 years ago
- VPS infrastructure found in HT dumps☆26Jul 10, 2015Updated 10 years ago
- Snowden Archive: The SIDtoday Files☆408May 30, 2019Updated 6 years ago
- iSEC Partners' research publications☆76Jul 8, 2016Updated 9 years ago
- Time managing app.☆10Jun 8, 2015Updated 10 years ago
- Standalone VPN/Tor WiFi router for journalists and activists☆47Mar 3, 2016Updated 9 years ago
- 💥 A collection of all documents leaked by former NSA contractor and whistleblower Edward Snowden.☆1,308Jan 14, 2020Updated 6 years ago
- [DEPRECATED] Hiccup is a framework that allows the Burp Suite (a web application security testing tool, http://portswigger.net/burp/) to …☆42Jan 2, 2019Updated 7 years ago
- DARPA Cyber Grand Challenge Linux source code☆17Jul 9, 2015Updated 10 years ago
- Scans the filesystem for directories that are user-writeable☆13Jun 21, 2021Updated 4 years ago
- Slides, codes, and materials related to my courses☆15Dec 19, 2025Updated 2 months ago
- Quantum Insert/FoxAcid case study☆16May 18, 2017Updated 8 years ago
- A TrustedBSD module to control execution of binaries with suid bit set☆38Oct 3, 2014Updated 11 years ago
- Search inside Snowden/NSA/GCHQ/whatever documents☆11Jul 11, 2014Updated 11 years ago
- CFE virtual competition framework☆14Feb 1, 2017Updated 9 years ago
- fuckNSA☆40Dec 5, 2013Updated 12 years ago
- Openfst mirror with some fixes☆14Aug 23, 2024Updated last year
- Optional plugins for MITMf☆17Dec 16, 2014Updated 11 years ago
- stuff from my ToorCon 2015 talk☆14Oct 27, 2015Updated 10 years ago
- Transform and writable streams with concurrent processing☆12May 29, 2016Updated 9 years ago
- ☆35Jun 4, 2018Updated 7 years ago
- Browser Share by feature☆21May 17, 2021Updated 4 years ago
- Open Source EDK2 GDB Server☆14Jun 19, 2018Updated 7 years ago
- Harvest self-signed certs from Project Sonar Internet-wide scan files and have a look around.☆10Mar 22, 2017Updated 8 years ago
- ☆14Jul 7, 2022Updated 3 years ago
- A small utility to run raw code chunks in the executable memory area.☆15Feb 6, 2015Updated 11 years ago
- Double pulsar tool of NSA leaked by SHADOW BROKERS☆15Jun 16, 2017Updated 8 years ago
- GSM Sniffer☆39Oct 16, 2011Updated 14 years ago
- Digital Forensics and Incident Response Wiki☆40May 19, 2014Updated 11 years ago
- CRITs IOC Visualization in Maltego☆28Jan 8, 2015Updated 11 years ago
- Tools for Cellular Exploitation on a Global Scale - Blackhat USA 2014☆24Feb 12, 2018Updated 8 years ago
- Simple script to automated the capture and merging process when using a hardware TAP☆15Mar 7, 2013Updated 12 years ago
- 基于Strom的实时流量分析防火墙系统☆12Jul 4, 2016Updated 9 years ago
- networked status aggregator sees all☆14Apr 26, 2021Updated 4 years ago
- Collection of scripts that I have used on Red Team engagements☆16Feb 15, 2018Updated 8 years ago
- Exploit Dev Wiki☆13Dec 29, 2013Updated 12 years ago
- Tool to check if your computer is likely to be vulnerable to exploitable constant Read-Write-Execute (RWX) addresses (AVs vulnerability)☆52Dec 8, 2015Updated 10 years ago