159 skills found · Page 1 of 6
BigNerd95 / Chimay RedWorking POC of Mikrotik exploit from Vault 7 CIA Leaks
ihaveamac / 3dsconvPython script to convert Nintendo 3DS CCI (".cci", ".3ds") files to the CIA format
Vegeta2020 / CIA SSDCIA-SSD: Confident IoU-Aware Single Stage Object Detector From Point Cloud, AAAI 2021.
hackerhouse-opensource / MarbleThe CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.
hackerhouse-opensource / StingerCIA UAC bypass implementation of Stinger that obtains the token from an auto-elevated process, modifies it, and reuses it to execute as Administrator.
xxmichibxx / Batch CIA 3DS Decryptor ReduxDecrypting Nintendo 3DS games and applications (.3ds, .cia)
shijimasoft / Cia UnixDecrypt CIA/3DS roms in UNIX environments (Linux and macOS)
iancoleman / Cia World Factbook ApiConverts the CIA World Factbook into a json data structure
twschiller / Open SynthesisOpen platform for CIA-style intelligence analysis
simonw / Cia World Factbook 2020Recovered cia.gov/the-world-factbook/about/archives/download/factbook-2020.zip from Internet Archive
xiaoyanguoke / CIAHackingToolsWikiLeaks Vault 7 CIA Hacking Tools
hackerhouse-opensource / ArtilleryCIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administrator.
infoskirmish / HiveThe CIA Hive source code as released by Wikileaks
zhyale / Book1《数据安全架构设计与实战》:本书系统性地介绍数据安全架构的设计与实践,融入了作者多年在安全领域积累的实践经验。全书分四大部分,共20章。 第一部分介绍安全架构的基础知识,内容包括安全、数据安全、安全架构、5A方法论、CIA等基本概念,为后续论述奠定基础。 第二部分介绍产品安全架构,内容包括:身份认证、授权、访问控制、审计、资产保护等,讲解如何从源头设计来保障数据安全和隐私安全,防患于未然。 第三部分介绍安全技术体系架构,内容包括:安全技术架构、网络和通信层安全架构、设备和主机层安全架构、应用和数据层安全架构、安全架构案例分析等。 第四部分介绍数据安全与隐私保护治理,内容包括:数据安全治理、数据安全政策文件体系、隐私保护基础与增强技术、GRC治理框架、数据安全与隐私保护的统一等。
d0k3 / 3DS Tools CollectionA small collection of various tools useful for modification of CIA and CCI files specific to the 3DS consol
smartperson / 3DS FBI LinkMac app to graphically push CIAs to FBI. Extra features over servefiles and Boop.
hackerhouse-opensource / WMIProcessWatcherA CIA tradecraft technique to asynchronously detect when a process is created using WMI.
tigthor / NSA CIA BlocklistThis is the github repository for all NSA and CIA spying servers, including those revealed by Edward Snowden and other studies we conducted on the whole world's servers, enumerating those that spy on individuals and sell data to the NSA and CIA.
DonnchaC / Cia Hacking Tool ArchiveCurated archive of tools from the Wikileaks CIA hacking tool leak, pull requests welcome https://wikileaks.org/ciav7p1/
Burton / Analysis Of Competing HypothesesAn analytic technique created at the CIA, ACH helps you analyze complex situations with multiple hypotheses and countless pieces of evidence. Multiple people can collaborate on a single problem, and ACH will compare everyone's analyses and pinpoint the precise areas of disagreement, allowing for a more focused debate.