「📖」Tool created to extract metadata from a domain
☆14Dec 7, 2024Updated last year
Alternatives and similar repositories for Metafind
Users that are interested in Metafind are comparing it to the libraries listed below
Sorting:
- 「🔎」CORS vulnerability scanner☆12Dec 7, 2024Updated last year
- 「🧹」Clear logs after an invasion☆18Dec 7, 2024Updated last year
- 「🍯」Simple low-interaction honeypot with FTP, Telnet and Web☆12Dec 7, 2024Updated last year
- 「🔑」Discord Brute Force Token☆10Mar 15, 2021Updated 4 years ago
- 「🧱」Test a list of payloads and see if you can bypass it☆62Jun 4, 2022Updated 3 years ago
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆25Aug 1, 2022Updated 3 years ago
- Subdomain Recon Tool☆13Sep 11, 2022Updated 3 years ago
- 「💥」CVE-2022-26134 - Confluence Pre-Auth RCE☆14Jun 19, 2022Updated 3 years ago
- Wolfy AV Bypasser☆30Feb 8, 2023Updated 3 years ago
- Strumenti per Domini - Whois - IP - Data Breach - Email☆18Oct 30, 2024Updated last year
- 「🐞」Bug Bounty Tricks☆41Oct 4, 2023Updated 2 years ago
- List of custom Nuclei templates☆16Nov 4, 2023Updated 2 years ago
- Git-eXposed is a tool designed to detect and extract sensitive information from exposed Git repositories☆11Sep 26, 2024Updated last year
- 「💻」Simple kernel made in 16-bit assembly only☆18Dec 7, 2024Updated last year
- A script to protect your king in KoTH☆18May 13, 2022Updated 3 years ago
- 「💉」XSS Payload List☆45Feb 26, 2023Updated 3 years ago
- 「🚪」Linux Backdoor based on ICMP protocol☆63Dec 7, 2024Updated last year
- This is a simple process injection made in C for Linux systems☆30Sep 23, 2023Updated 2 years ago
- 「💽」MBR Overwrite malware for linux☆28Dec 7, 2024Updated last year
- ALAT TOLL KEPERLUAN ONLINE☆13Jan 10, 2019Updated 7 years ago
- command-line tool designed to rapidly scan decompiled Android applications for hardcoded secrets. It moves beyond simple keyword searchi…☆41Aug 5, 2025Updated 6 months ago
- Script Deface Keren Dan Berkelas☆10Jun 26, 2022Updated 3 years ago
- Advanced Tool To Scan And Exploit Local File Inclusion (LFI) Vulnerabilities☆36Jun 24, 2023Updated 2 years ago
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆39Dec 7, 2024Updated last year
- 「🛡️」AVs/EDRs Evasion tool☆103Dec 7, 2024Updated last year
- GH Scanner Tool is written in Python3 and designed for penetration testers and bug bounty hunters to scan Organization/User repositories …☆34Jul 13, 2025Updated 7 months ago
- Offensive recon with GitHub Actions☆11Aug 25, 2024Updated last year
- PsSetCreateProcessNotifyRoutine/Ex/Ex2 hook☆12May 30, 2024Updated last year
- T.U.F.F. - Targeted Utility for Fast Forensics is mainly used to recon websites and IP addresses for vulnerabilities for an easier pentes…☆11May 26, 2023Updated 2 years ago
- Virtual Audio Loopback Cable for Windows☆10Sep 18, 2022Updated 3 years ago
- A wrapper around Windows, calls explicitly the lowest possible calls☆14Jan 19, 2023Updated 3 years ago
- Aplikasi booking futsal berbasis web☆11Apr 8, 2022Updated 3 years ago
- Find hidden directories from domain and subdomain.☆11Mar 27, 2022Updated 3 years ago
- 27 ways to bypass 2FA/otp☆52Jul 20, 2023Updated 2 years ago
- Burp-Addons : Some of Burp Addons I use ( Mindak ak fahem )☆11Sep 1, 2022Updated 3 years ago
- OSWE-cheat sheet module by module with updated syllabus☆12May 25, 2021Updated 4 years ago
- A malicious KeePass plugin to exfiltrate the master key.☆15Oct 25, 2021Updated 4 years ago
- WP Juicer Tool for quick scanning of confidential information on WordPress endpoints.☆10Apr 30, 2024Updated last year
- Just an example of a well-known technique to detect memory tampering via Windows Working Sets.☆18Jan 15, 2022Updated 4 years ago