The CIA Hive source code as released by Wikileaks
-
Updated
Feb 1, 2022 - C
The CIA Hive source code as released by Wikileaks
Mikrotik RouterOS (6.x < 6.38.5) exploit kit. Reverse engineered from the "Vault 7" WikiLeaks publication.
A means of archving the files that were leaked on Wikileaks as a backup. These are downloaded to the best of my abilities to try and collect the wiki pages, html files, and other sorts of files, pdfs, whatever I might find within the documents.
A diverse collection of privacy, security, and FOSS resources in English and Arabic, encompassing tools, extensions, operating systems, encryption, and more. An invaluable repository for bolstering digital security and privacy.
This is a minified exploit for mikrotik routers. It does not require any aditional modules to run.
Inspired by the CIA's Top Secret projects revealed by Wikileaks, this scripts can spy an router
The CIA Hive Component, Network Security Project - Università della Calabria
This tool can be used to find the most influential words on a document. We define most influential as the words that influence a trained classifier the most to give it a particular classification.
Whoops! There is Nothing Here. Forbidden.
Rebooting Wikileaks: New architecture , new implementation , new technology , to hide data, to hide the identity of whistleblowers!
Add a description, image, and links to the wikileaks topic page so that developers can more easily learn about it.
To associate your repository with the wikileaks topic, visit your repo's landing page and select "manage topics."