Just-Metadata is a tool that gathers and analyzes metadata about IP addresses. It attempts to find relationships between systems within a large dataset.
☆629Jun 25, 2024Updated last year
Alternatives and similar repositories for Just-Metadata
Users that are interested in Just-Metadata are comparing it to the libraries listed below
Sorting:
- This repo is for WMIOps, a powershell script which uses WMI for various purposes across a network.☆388Jun 25, 2024Updated last year
- (extensible) Data Exfiltration Toolkit (DET)☆827Nov 3, 2017Updated 8 years ago
- Egress-Assess is a tool used to test egress data detection capabilities☆696Aug 9, 2023Updated 2 years ago
- Email recon made fast and easy, with a framework to build on☆953Jan 12, 2023Updated 3 years ago
- Malicious HTTP traffic explorer☆724Mar 16, 2023Updated 2 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆1,385Jun 17, 2022Updated 3 years ago
- This is a PowerShell based tool that is designed to act like a RAT. Its interface is that of a shell where any command that is supported …☆842Jun 25, 2024Updated last year
- DPS' Lightweight Investigation Notebook☆433Dec 31, 2023Updated 2 years ago
- Automated digital reconnaissance☆203Dec 8, 2022Updated 3 years ago
- Cli interface to threatcrowd.org☆20Jul 6, 2017Updated 8 years ago
- A tool for security professionals to access and interact with remote Microsoft Windows based systems.☆432Nov 17, 2017Updated 8 years ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆351Aug 27, 2018Updated 7 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,227Nov 20, 2025Updated 3 months ago
- Machinae Security Intelligence Collector☆539May 15, 2024Updated last year
- A PoC backdoor that uses Gmail as a C&C server☆1,348Nov 16, 2018Updated 7 years ago
- Web App for Volatility framework☆390Jan 13, 2026Updated last month
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,650Jan 5, 2026Updated last month
- This Powershell script will generate a malicious Microsoft Office document with a specified payload and persistence method.☆686Oct 27, 2016Updated 9 years ago
- An open source framework for enterprise level automated analysis.☆394Jun 27, 2022Updated 3 years ago
- Auto Domain Admin and Network Exploitation.☆299Dec 21, 2017Updated 8 years ago
- Automater - IP URL and MD5 OSINT Analysis☆552Aug 13, 2024Updated last year
- Sniffs sensitive data from interface or pcap☆1,813Nov 2, 2023Updated 2 years ago
- A fully featured backdoor that uses Twitter as a C&C server☆790Sep 30, 2020Updated 5 years ago
- Brosec - An interactive reference tool to help security professionals utilize useful payloads and commands.☆353Jan 12, 2023Updated 3 years ago
- PowerShell Runspace Post Exploitation Toolkit☆1,548Aug 2, 2019Updated 6 years ago
- A fast and stealthy credential harvester☆627Jul 11, 2023Updated 2 years ago
- Malcom - Malware Communications Analyzer☆1,164Nov 29, 2017Updated 8 years ago
- An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector☆1,019Sep 11, 2017Updated 8 years ago
- Exploit the credentials present in files and memory☆843May 25, 2023Updated 2 years ago
- Modular file scanning/analysis framework☆622Oct 8, 2019Updated 6 years ago
- Scripts that are useful for me on pen tests☆538Jun 8, 2022Updated 3 years ago
- VolatilityBot – An automated memory analyzer for malware samples and memory dumps☆270Jun 15, 2021Updated 4 years ago
- Powershell C2 Server and Implants☆575Nov 11, 2019Updated 6 years ago
- PowerForensics provides an all in one platform for live disk forensic analysis☆1,428Nov 16, 2023Updated 2 years ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,035May 27, 2020Updated 5 years ago
- A webshell framework for penetration testers.☆300Aug 10, 2025Updated 6 months ago
- The TrustedSec Attack Platform is a reliable method for droppers on an infrastructure in order to ensure established connections to an or…☆501Nov 17, 2022Updated 3 years ago
- Indicator Extractor☆141Jul 14, 2018Updated 7 years ago
- A low to medium interaction honeypot.☆473Mar 21, 2024Updated last year