Mikrotik RouterOS (6.x < 6.38.5) exploit kit. Reverse engineered from the "Vault 7" WikiLeaks publication.
-
Updated
Jun 11, 2018 - Python
Mikrotik RouterOS (6.x < 6.38.5) exploit kit. Reverse engineered from the "Vault 7" WikiLeaks publication.
The CIA Hive source code as released by Wikileaks
This is a minified exploit for mikrotik routers. It does not require any aditional modules to run.
A means of archving the files that were leaked on Wikileaks as a backup. These are downloaded to the best of my abilities to try and collect the wiki pages, html files, and other sorts of files, pdfs, whatever I might find within the documents.
The CIA Hive Component, Network Security Project - Università della Calabria
This tool can be used to find the most influential words on a document. We define most influential as the words that influence a trained classifier the most to give it a particular classification.
A diverse collection of privacy, security, and FOSS resources in English and Arabic, encompassing tools, extensions, operating systems, encryption, and more. An invaluable repository for bolstering digital security and privacy.
233558938299@dysgo.org
Inspired by the CIA's Top Secret projects revealed by Wikileaks, this scripts can spy an router
Whoops! There is Nothing Here. Forbidden.
Rebooting Wikileaks: New architecture , new implementation , new technology , to hide data, to hide the identity of whistleblowers!
Add a description, image, and links to the wikileaks topic page so that developers can more easily learn about it.
To associate your repository with the wikileaks topic, visit your repo's landing page and select "manage topics."