Tools – CGTF

Free Network and Geo Analysis Tools
Share and accept documents securely
SecureDrop is an open-source whistleblower submission system that media organizations can install to securely accept documents from anonymous sources. It was originally coded by the late Aaron Swartz and is now managed by Freedom of the Press Foundation.
Building an offensive Windows RPC interface
This article will describe how to create a backdoored RPC interface.
TravisPooley/WHID-Payloads: A collection of Payloads for the WHID Cactus
A collection of Payloads for the WHID Cactus. Contribute to TravisPooley/WHID-Payloads development by creating an account on GitHub.
Libreboot – Free and Open Source BIOS/UEFI boot firmware
ffwww anything i mean anything can be a router
anything can be a router...
anything reprogrammable that can access the internet can route traffic on the internet...
your hacked nintendo wii running freebsd, your thinkpad x200 running libreboot, your set-top-box running postmarketOS, your postmarketos tablet... anything can be a router.....
NARKOZ/hacker-scripts: Based on a true story automating everything?
Based on a true story. Contribute to NARKOZ/hacker-scripts development by creating an account on GitHub.
Apps using UnifiedPush
This is a non-exhaustive list of the first few end-user applications that use UnifiedPush.
Android Name Description Date Since version Docs¹ FluffyChat Matrix chat January 2021 v0.26.1 FluffyChat Wiki² Fedilab Mastodon/Fediverse March 2021 v2.39.0 Fedilab FAQ Tox Push Message App Tox chat May 2021 v1.0.3 SchildiChat Matrix chat September 2021 v1.2.0.sc42 FMD Find your device November 2021 v0.2.2 FMD docs Element Matrix chat June 2022 v1.4.26 Tusky Mastodon/Fediverse July 2022 v19.0 Neon Nextcloud July 2022 Unreleased Jami Jami March 2023 v361 Goguma IRC client March 2023 v0.5.0 Circles Social Network (matrix) June 2023 v1.0.11 Databag Messaging Service July 2023 v1.5.0 Podverse (beta) Podcast Manager July 2023 v4.13.1 Moshidon Mastodon August 2023 v2.0.3+fork.98 Träwelldroid Traewelling client September 2023 v2.0.0 Pachli Mastodon September 2023 v1.0.0 Molly Signal client October 2023 v6.35.3-1.up1 Molly Readme, MollySocket Amethyst Nostr client October 2023 v0.80.1 Ltt.rs Mail (JMAP) client December 2023 0.4.0 Mercurygram Telegram client December 2023 v10.3.2.1 Element-X Matrix chat January 2024 v0.4.2 SchildiChat Next Matrix chat January 2024 v0.4.2.sc1 Nagram Telegram client April 2024 10.9.1.1165 DAVx⁵ CalDAV/CardDAV/WebDAV September 2024 v4.4.2-ose Nextcloud extension for WebDAV-Push polycule Matrix chat September 2024 v0.0.1 Momogram Telegram client December 2024 v11.4.2-1 FOSS Warn Emergency alerts December 2024 1.0.0 alpha0 FOSS Warn Wiki Wafrn App Social Network (Fediverse + Bluesky) May 2025 v1.3.0 Forkgram Telegram client June 2025 11.9.2.0 Fennec Web Browser³ July 2025 141.0.0 IronFox Web Browser³ July 2025 140.0.4 Compete Create & join all kind of challenges July 2025 v1.0.0 ¹ App-specific documentation should not be needed. Compatible apps should just work after installing a UnifiedPush distributor.
Integrations + projects - ntfy
Send push notifications to your phone via PUT/POST
July 28, 2025 trump.chickens out on Trump shortens Russia's peace deal deadline from 50 to '10 or 12 days'
Earlier this month, Trump said he had given Moscow 50 days to reach a peace deal or face what he said would be "very severe" economic sanctions during a visit to Washington by NATO Secretary General Mark Rutte. #EuropeNews
Biden Administration Sanctions Hundreds of Parties Under the Russia Sanctions - Global Sanctions and Export Controls Blog
The Biden Administration issued another round of sanctions against Russia in its final days, with less than a week left in the Administration. This followed on the heels of major sanctions imposed by OFAC on Russia’s energy sector just five days prior – see our blog post on that development here. Specifically, on January 15,
Sanctions timeline
Bullet site dashboard
Docuflow | Notion template site for bullet
Documentation template for Saas, Software, and Businesses
Documentation template for Notion | Democracy Forever
bullet makes a notion templatw into live site
Sherrill Calls for Investigations Into Elon Musk’s Vast Conflicts of Interest and Self-Dealing at Federal Agencies | Congresswoman Mikie Sherrill
WASHINGTON, DC — Representative Mikie Sherrill (NJ-11) is calling for inspectors general at eight federal agencies to open investigations into Elon Musk and the Department of Government Efficiency’s (DOGE) conflicts of interest. Inspectors General are independent watchdogs at federal agencies who investigate waste, fraud, abuse, and corruption.
Online PGP - Easily Generate PGP Keys, Encryption/Decryption, Sign/Verify PGP Message
Discover our PGP encryption/decryption site, where you can generate keys, encrypt and decrypt messages securely. Protect your communications with our easy-to-use PGP system.
Infosec 101 for Activists
Website: https://infosecforactivists.org/
Introduction America has a strong tradition of activism, dating back to slave revolts and indigenous uprisings even before the founding of the United States. Today, activism in the US remains critical. Street protests are an essential tool that activists use to raise awareness and push for institutional change. That being said, challenging existing power structures carries an element of risk - exposure can lead to harassment, arrest, or doxxing.
Choose Democracy: resources to promote democracy
Regular people can stop an undemocratic power grab, but only if we prepare and together, we choose democracy.
Leaked DC Troop Deployment Order - Ken Klippenstein
Read the National Guard order sending troops to our nation's capital
pazly.dev: The free one website builder for yourself, your product, your crypto domain and more
Drag and drop UI components and build beautiful responsive websites. No coding skills needed. All components look great on mobile and desktop screens.
Keep your phone number private with Signal usernames
Signal’s mission and sole focus is private communication. For years, Signal has kept your messages private, your profile information (like your name and profile photo) private, your contacts private, and your groups private – among much else. Now we’re taking that one step further, by making your...
Matrix.org end to end encrypted chat
Matrix, the open protocol for secure decentralised communications
BLE Security: Where To Begin When Creating A Connected System – Punch Through
Start with BLE security best practices when building a connected system. Learn how to reduce risks from the start with pairing, bonding, and architecture choices.
Bluetooth Smart Hackmelock
Open-source vulnerable device and mobile application for training
The Malicious Ignorance of MAGA
How the Epstein case is the new loyalty test for MAGA
Application creation - Console - Clever Cloud
Access your Clever Cloud console to manage, deploy and monitor your applications on our sovereign Cloud. Benefit from a scalable infrastructure, complete automation and live monitoring.
Citable Code | Codeberg Documentation
Bluetooth Vulnerabilities in Android, MacOS, iOS, Linux let attackers inject data - Thyrasec
Researchers have found new Bluetooth vulnerabilities in Bluetooth HID allowing attackers to inject keystrokes
Android – Vulnerable if Bluetooth is enabled. Allows injecting keystrokes
Reports are periodic messages with a specific format that are transmitted by an HID device and processed by the host.
Input HID reports include input data like keyboard keypress and mice movements / button clicks
. Bluetooth Logical Link Control and Adaptation Protocol (L2CAP
and it’s the entry point to send data to the system.
L2CAP Channel 0x0013 (19) – HID Interrupt which allows sending input and output reports with low latency
The key here is that if we are able to send packets with the right format to the HID control and interrupt channels, that means we are acting as if we’re a keyboard or mouse.
the keyboard can start the connection and pairing process. That’s normally not an issue but it seems that in many cases the authentication process can be bypassed altogether.
Now, the key in getting this to work is that the keyboard can specify certain settings that allow it to not require authentication. These are certain fields in the connection packets .
That is, only peripherals that were previously paired can reconnect this way. The way this is done is by identifying devices by their Bluetooth address
jopohl/urh: Universal Radio Hacker: Investigate Wireless Protocols Like A Boss
Universal Radio Hacker: Investigate Wireless Protocols Like A Boss - jopohl/urh
Fed Whistleblowers