{
	"id": "5a75480b-27f6-4ed4-9f61-99a97af8a1d2",
	"created_at": "2026-04-06T00:18:17.089454Z",
	"updated_at": "2026-04-10T03:21:54.430377Z",
	"deleted_at": null,
	"sha1_hash": "f722ed73eb32789212cf5493a2ddeed3be7f995e",
	"title": "Joint report on publicly available hacking tools",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 33167,
	"plain_text": "Joint report on publicly available hacking tools\r\nPublished: 2018-10-11 · Archived: 2026-04-05 15:55:12 UTC\r\nThis report is a collaboration based on research provided by the cyber security authorities of five nations:\r\nAustralia, Canada, New Zealand, the UK and USA.\r\nIn it we highlight the use of five publicly-available tools, observed in recent cyber incidents around the world. To\r\naid the work of network defenders and systems administrators, we also provide advice on limiting the\r\neffectiveness of these tools and detecting their use on a network.\r\nDownloads\r\nPdf\r\n547.23 KB\r\nJoint report on publicly available hacking tools (NCSC).pdf\r\nJoint report on publicly available hacking tools (NCSC).pdf\r\nSource: https://www.ncsc.gov.uk/report/joint-report-on-publicly-available-hacking-tools\r\nhttps://www.ncsc.gov.uk/report/joint-report-on-publicly-available-hacking-tools\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"references": [
		"https://www.ncsc.gov.uk/report/joint-report-on-publicly-available-hacking-tools"
	],
	"report_names": [
		"joint-report-on-publicly-available-hacking-tools"
	],
	"threat_actors": [],
	"ts_created_at": 1775434697,
	"ts_updated_at": 1775791314,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/f722ed73eb32789212cf5493a2ddeed3be7f995e.pdf",
		"text": "https://archive.orkl.eu/f722ed73eb32789212cf5493a2ddeed3be7f995e.txt",
		"img": "https://archive.orkl.eu/f722ed73eb32789212cf5493a2ddeed3be7f995e.jpg"
	}
}