Vault 7: CIA Hacking Tools Revealed - WikiLeaks
...The CIA attacks this software by using undisclosed security vulnerabilities ("zero days") possessed by the CIA but if the CIA can hack these phones then so can everyone else who has obtained or discovered the vulnerability....
https://wikileaks.org/ciav7p1/
WikiLeaks - Intelligence
...Today, April 7th 2017, WikiLeaks releases 27 documents from the CIA's Grasshopper framework, a platform used to build customized malware payloads for Microsoft Windows operating systems....
https://wikileaks.org/+-Intelligence-+.html
WikiLeaks - Vault 8
...Vault 8 Source code and analysis for CIA software projects including those described in the Vault7 series. This publication will enable investigative journalists, forensic experts and the general public to better identify and understand covert CIA infrastructure components....
https://wikileaks.org/vault8/
Vault 7 - our.wikileaks.org
...2017/02/04 - WikiLeak's publication of Vault 7 begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named Vault 7 by WikiLeaks, it is the largest ever publication of confidential documents on the agency. Search on WikiLeaks Countries: United States Categories: Intelligence, Hacking...
https://our.wikileaks.org/Vault_7
WikiLeaks - Vault 7: Projects
...Today, June 28th 2017, WikiLeaks publishes documents from the ELSA project of the CIA. ELSA is a geo-location malware for WiFi-enabled devices like laptops running the Micorosoft Windows operating system....
https://wikileaks.org/vault7/
WikiLeaks - Leaks
...Today, April 7th 2017, WikiLeaks releases 27 documents from the CIA's Grasshopper framework, a platform used to build customized malware payloads for Microsoft Windows operating systems....
https://wikileaks.org/-Leaks-.html
WikiLeaks - Hive Repository
...Source code and analysis for CIA software projects including those described in the Vault7 series. This publication will enable investigative journalists, forensic experts and the general public to better identify and understand covert CIA infrastructure components....
https://wikileaks.org/vault8/document/repo_hive/
our.wikileaks.org
...Welcome to the WL Research Community. We are a group of volunteers who compile summarized information from data published by WikiLeaks. Join us as we bring truth to light on some of the most powerful political and corporate entities in the world. Interested in joining? Checkout our Getting Started guide....
https://our.wikileaks.org/Main_Page
Vault 7: CIA Hacking Tools Revealed - our.wikileaks.org
...Vault 7 is a series of WikiLeaks releases on the CIA and the methods and means they use to hack, monitor, control and even disable systems ranging from smartphones, to TVs, to even dental implants....
https://our.wikileaks.org/Vault_7:_CIA_Hacking_Tools_Revealed
CIA Review of High-Value Target Assassination Programs - WikiLeaks
...WikiLeaks today, Thursday 18 December, publishes a review by the Central Intelligence Agency (CIA) of its "High Value Target" (HVT) assassination programme. The report weighs the pros and cons of killing "insurgent" leaders in assassination plots....
https://wikileaks.org/cia-hvt-counterinsurgency/