Posts

Crypto Currency
bg
What are the best cryptocurrencies for swing trading?

What are the best cryptocurrencies for swing trading?

Swing trading is a short-term trading strategy designed to take advantage of short-term...

Crypto Currency
bg
The best crypto tokens based on the Elrond Network

The best crypto tokens based on the Elrond Network

Elrond (EGLD) is a highly scalable and powerful blockchain designed for distributed...

Crypto Currency
bg
These are the best cryptocurrencies for staking

These are the best cryptocurrencies for staking

Staking offers crypto investors a chance to make decent passive income while taking...

Declassified files
bg
Sue the Dinosaur and the Black Hills Institute of Geological Research

Sue the Dinosaur and the Black Hills Institute of Geological...

Background For a quick synopsis, I’d like to reference the Wikipedia article on...

Declassified files
bg
Data and Information Release Committee of the Program Review Board Meeting Summary – August 10, 1977

Data and Information Release Committee of the Program Review...

The below paper was declassified, in part, in 2012 to the National Security Archive....

Declassified files
bg
FBI Files: Directors, Agents and Personnel of the Central Intelligence Agency (CIA)

FBI Files: Directors, Agents and Personnel of the Central...

Background The Central Intelligence Agency was created in 1947 with the signing...

Declassified files
bg
FBI Files: Civil Rights

FBI Files: Civil Rights

Background Movements for civil rights were a worldwide series of political movements...

Declassified files
bg
Air Force Office of Special Investigations (AFOSI) Closed Investigation Lists

Air Force Office of Special Investigations (AFOSI) Closed...

The Office of Special Investigations has been the Department of the Air Force’s...

Declassified files
bg
James Clapper E-Mails Containing Keyword “Bilderberg”

James Clapper E-Mails Containing Keyword “Bilderberg”

James Robert Clapper Jr. (born March 14, 1941) is a retired lieutenant general in...

Declassified files
bg
FBI Files: Scientists and Medical Professionals

FBI Files: Scientists and Medical Professionals

Below you will find various FBI files on prominent scientists and medical professionals...

Declassified files
bg
DoD/CIA-NASA Agreement on NASA Reconnaissance Programs, 28 August 1963

DoD/CIA-NASA Agreement on NASA Reconnaissance Programs,...

The following document was first released to the National Security Archive circa...

Declassified files
bg
FOIA Appeal Win May Help UFO Transparency – Here’s the story…

FOIA Appeal Win May Help UFO Transparency – Here’s the...

Although not guaranteed to get anything yet, the Navy Office of the Judge Advocate...

Hacking
bg
Jektor - A Windows User-Mode Shellcode Execution Tool That Demonstrates Various Techniques That Malware Uses

Jektor - A Windows User-Mode Shellcode Execution Tool That...

This utility focuses on shellcode injection techniques to demonstrate methods that...

Hacking
bg
Log4J-Detector - Detects Log4J versions on your file-system within any application that are vulnerable to CVE-2021-44228 and CVE-2021-45046

Log4J-Detector - Detects Log4J versions on your file-system...

Detects Log4J versions on your file-system within any application that are vulnerable...

Hacking
bg
Mariana Trench - Security Focused Static Analysis Tool For Android And Java Applications

Mariana Trench - Security Focused Static Analysis Tool...

Mariana Trench is a security focused static analysis platform targeting Android.This...

Hacking
bg
log4j-scan - A fully automated, accurate, and extensive scanner for finding vulnerable log4j hosts

log4j-scan - A fully automated, accurate, and extensive...

A fully automated, accurate, and extensive scanner for finding vulnerable log4j...

Hacking
bg
Mesh-Kridik - An Open-Source Security Checker That Performs Various Security Checks On A Kubernetes Cluster With Istio Service Mesh And Is Leveraged By OPA (Open Policy Agent) To Enforce Security Rules

Mesh-Kridik - An Open-Source Security Checker That Performs...

Enhance your Kubernetes service mesh security !!mesh-kridik is an open-source security...

Hacking
bg
Web Cache Vulnerability Scanner - A Go-based CLI Tool For Testing For Web Cache Poisoning

Web Cache Vulnerability Scanner - A Go-based CLI Tool For...

Web Cache Vulnerability Scanner (WCVS) is a fast and versatile CLI scanner for web...

Hacking
bg
Umay - IoT Malware Similarity Analysis Platform

Umay - IoT Malware Similarity Analysis Platform

IoT Malware Similarity Analysis PlatformView Demo This project provides IoT malware...

Hacking
bg
MUI - A GUI Plugin For Binary Ninja To Easily Interact With And View The Progress Of Manticore

MUI - A GUI Plugin For Binary Ninja To Easily Interact...

With the Manticore User Interface (MUI) project, we provide a graphical user interface...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.