Read Time:46 Second

ALERT!!! We not supporting unlawful active attack or malware campaings that are causing technical harms. Use only for educational purposes. You can only try this platform on your own website!

Volunteer cyber defense system of Ukraine

For cybersecurity

  1. Programs are in releases
  2. Choose the latest release and your platform
  3. Download and run

Linux users may need to add an argument --no-sandbox. It should work on Windows without any additional arguments

How it works

Our volunteer center does all the hard work: monitoring goals, maintaining technical infrastructure, coordinating attacks, transferring data to client programs, and more. Therefore, at the time of the attack, all the preparatory data is available. All you have to do is install the program and join. Goals change automatically and are downloaded from the coordination center.

Program interface

A working example

https://github.com/opengs/uashield

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
100 %
Angry
Angry
0 %
Surprise
Surprise
0 %
%d bloggers like this: