WikiLeaks Vault 7 CIA Hacking Tools
☆50Sep 9, 2017Updated 8 years ago
Alternatives and similar repositories for CIA-Hacking-Tools
Users that are interested in CIA-Hacking-Tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- WikiLeaks Vault 7 CIA Hacking Tools☆25Sep 20, 2020Updated 5 years ago
- Various tools to aid with scambaiting☆12Dec 2, 2018Updated 7 years ago
- Vault 7: CIA Hacking Tools Revealed☆17Mar 8, 2017Updated 9 years ago
- ☆12Jul 8, 2020Updated 5 years ago
- A rust proof of concept to demonstrate registry overwriting via RegRestoreKey using the Offline Registry Library☆24Nov 13, 2025Updated 4 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Community Eventing and Scripting examples☆19Aug 11, 2025Updated 7 months ago
- Magspoof implementation via ESP8266 (ledunia)☆21Jul 27, 2018Updated 7 years ago
- 🐍 Python Exploit for CVE-2022-0739☆11Dec 9, 2022Updated 3 years ago
- A PoC exploit for CVE-2023-51467 - Apache OFBiz Authentication Bypass☆12Dec 31, 2023Updated 2 years ago
- ☆13Apr 14, 2024Updated last year
- Used to get NTLMv2 Hashes from SMB☆23Oct 24, 2024Updated last year
- ☆14Mar 28, 2018Updated 7 years ago
- An example of an external LLVM plugin module transform pass for the latest versions.☆14Oct 21, 2025Updated 5 months ago
- Remote printing by Windows print spooler API forwarding.☆16Aug 3, 2015Updated 10 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆10Oct 25, 2017Updated 8 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆14Jun 23, 2022Updated 3 years ago
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆26Sep 25, 2023Updated 2 years ago
- abusing windows toast notifications for fun and user manipulation☆57Updated this week
- An example application that uses Lyrebird's avatar API.☆15Sep 5, 2018Updated 7 years ago
- ☆17May 21, 2022Updated 3 years ago
- Simple Automation script for juniper cve-2023-36845☆19Jan 30, 2024Updated 2 years ago
- Rust crate to parse user-mode minidump files generated on Windows☆18Nov 17, 2025Updated 4 months ago
- About C# loader that copies a chunk at the time of the shellcode in memory in a suspended process, rather that all at once☆13Jul 14, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability.☆11Nov 26, 2022Updated 3 years ago
- An automated scanning, enumeration, and note taking tool for pentesters☆13Jul 26, 2022Updated 3 years ago
- A proof of concept reverse shell in Rust for Windows and Linux.☆12Jul 6, 2021Updated 4 years ago
- Automate the creation of Backdoors and postexplotation activities☆23Jun 20, 2022Updated 3 years ago
- A small PoC using DInvoke, dynamically mapping a DLL and executing Win32 APIs for process injection.☆10Dec 16, 2021Updated 4 years ago
- Decrypt Matrix42 Empirum /EIS Passwords☆14Mar 31, 2021Updated 4 years ago
- SensePost's modified hostapd for wifi attacks.☆13Oct 11, 2020Updated 5 years ago
- Bait bank created for scambaiting☆31May 28, 2020Updated 5 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆14Sep 30, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Hardware design files for the PMOD based MUX☆13Aug 22, 2019Updated 6 years ago
- OwOwning with the Windows API Examples and Code. DEFCON Furs 2020 presentation.☆13Jan 18, 2024Updated 2 years ago
- Your one-stop shop for everything you need to know during #Hack weekend.☆11May 31, 2019Updated 6 years ago
- This library allows you to safely test your migration from one back-end to another in production☆18Mar 17, 2026Updated last week
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- DLL Unhooking☆12Mar 26, 2021Updated 4 years ago
- This project will scrape all of repos on github according to the keywords.☆13Apr 3, 2019Updated 6 years ago