nsa-observer / documents
TXT and PDF documents from the NSA
☆188Updated 10 years ago
Alternatives and similar repositories for documents:
Users that are interested in documents are comparing it to the libraries listed below
- NSA documents in machine readable form☆93Updated 6 years ago
- Hacker OPSEC☆96Updated 7 years ago
- A fast and modular scanner for Tor exit relays. The canonical repository (including issue tracker) is at https://gitlab.torproject.org/tp…☆458Updated last year
- Every document published from the Snowden archive☆68Updated 10 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆144Updated 9 years ago
- Config generator for chaos vpn☆122Updated 2 years ago
- Snowden Archive: The SIDtoday Files☆405Updated 5 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- Panic button for protection against cold boot attacks☆141Updated 3 years ago
- A python2 script for processing a PCAP file to decrypt C2 traffic sent to DOUBLEPULSAR implant☆224Updated 8 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- Guides, Tools, Tips and such for working with the Shadow Brokers dumps☆228Updated 6 years ago
- Compilation of ready to run exploits, advisories, tools and online key generators for embedded devices.☆136Updated 9 years ago
- Code written as part of our various malware investigations☆396Updated 4 months ago
- Offensives network security framework for Wireless and MiTM style hacking☆60Updated 7 years ago
- Shodan Firefox Add-on☆152Updated 3 years ago
- A simple Tor enabled, multi-process SSH dictionary attack in Python3.☆18Updated 7 years ago
- Router EXploitation Toolkit - small toolkit for easy creation and usage of various python scripts that work with embedded devices.☆342Updated 8 years ago
- Automated Linux evil maid attack☆426Updated 9 years ago
- Meteor based NSA items database and vizualisation☆21Updated 10 years ago
- Quantum Insert☆212Updated 6 years ago
- EternalRocks worm☆459Updated 7 years ago
- ☆230Updated 9 years ago
- A honeypot for malware that propagates via USB storage devices☆96Updated 10 years ago
- Fancy Bear Source Code☆261Updated 8 years ago
- Twitter as an extra entropy source☆100Updated 6 years ago
- Private keys that have become public ...☆175Updated 3 weeks ago
- Abstracts and expedites the process of backdooring stock firmware images for consumer/SOHO routers☆122Updated 11 years ago
- Source code for my crackstation.net website.☆145Updated 3 years ago
- Honeypot (Dionaea and kippo) setup script☆84Updated 8 years ago