Equation Group Firewall Operations Catalogue by Mustafa Al-Bassam.
From the post:
This week someone auctioning hacking tools obtained from the NSA-based hacking group “Equation Group” released a dump of around 250 megabytes of “free” files for proof alongside the auction.
The dump contains a set of exploits, implants and tools for hacking firewalls (“Firewall Operations”). This post aims to be a comprehensive list of all the tools contained or referenced in the dump.
…
Mustafa’s post is a great illustration of why “being found beats searching, every time.”
Think of the cycles you would have to spend to duplicate this list. Multiple that by the number of people interested in this list. Assuming their time is not valueless, do you start to see the value-add of Mustafa’s post?
Mustafa found each of these items in the data dump and then preserved his finding for the use of others.
It’s not a very big step beyond this preservation to the creation of a container for each of these items, enabling the preservation of other material found on them or related to them.
Search is a starting place and not a destination.
Unless you enjoy repeating the same finding process over and over again.
Your call.