Big Data tool for metadata extraction (Exif), enrichment (using DeepLearning) and analysis
☆29Jul 21, 2020Updated 5 years ago
Alternatives and similar repositories for metadata-digger
Users that are interested in metadata-digger are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆17Jan 2, 2020Updated 6 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 6 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Dec 6, 2020Updated 5 years ago
- Provides a multi-platform Graphical User Interface for hashlookup☆12Jul 12, 2024Updated last year
- psgen is a powershell payload generator tool for hacking. It can be used to generate, minify, and encode the powershell payload (e.g., re…☆18Jun 30, 2020Updated 5 years ago
- 📥 AI OSINT - Capture, download, and enjoy.☆34Sep 23, 2025Updated 6 months ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Aug 13, 2024Updated last year
- A proof-of-concept Node.js ransomware☆21Mar 27, 2022Updated 3 years ago
- Collection of various WINAPI tricks / features used or abused by Malware☆13Mar 28, 2022Updated 3 years ago
- PoC + vulnerability details for CVE-2022-25262 / JetBrains Hub single-click SAML response takeover☆16Jul 5, 2022Updated 3 years ago
- List to block ads, trackers & malwares. Plus 200.000 unique domains and about 4 MB in size.☆34Jun 19, 2023Updated 2 years ago
- GTK3 ProtonVPN Client using offical ProtonVPN-CLi☆22May 8, 2020Updated 5 years ago
- AI-Powered OSINT Image Analysis☆24Jan 18, 2024Updated 2 years ago
- ☆17May 21, 2022Updated 3 years ago
- Windows Privilege Escalation☆74Jun 7, 2022Updated 3 years ago
- Wi-Fi Exploit Tool☆50May 23, 2020Updated 5 years ago
- FIles and guides related to using Elasticstack as a SIEM☆12May 16, 2020Updated 5 years ago
- Yet another web recon tool☆61Aug 9, 2023Updated 2 years ago
- Case for CVE-2022-30778☆23Aug 23, 2022Updated 3 years ago
- ☆19Jul 21, 2022Updated 3 years ago
- mybatis-audit-tool☆10Nov 16, 2022Updated 3 years ago
- DarkSpy facilitates a secure and educational environment to comprehend the mechanics of establishing connections between two machines. Th…☆51Jan 20, 2026Updated 2 months ago
- Track planes by ICAO, Type, Operator and Squawk and issue notifications on Mastodon, Discord, and Twitter☆13Jan 10, 2024Updated 2 years ago
- Validate that a password hasn't been exposed in a data breach.☆13Mar 6, 2020Updated 6 years ago
- Zyxel 防火墙远程命令注入漏洞(CVE-2022-30525)☆22May 13, 2022Updated 3 years ago
- ☆10Sep 24, 2017Updated 8 years ago
- Hunting Newly Registered Domains☆10Jan 6, 2019Updated 7 years ago
- A simple tool to check subdomains for clickjacking attack.☆12Mar 30, 2021Updated 4 years ago
- My own diary notes. Adding the commands, tools, techniques, and resources that I will not memorize.☆15Jul 5, 2023Updated 2 years ago
- XDROID is android all in one hack tools☆38Jul 30, 2025Updated 7 months ago
- this project is a set of best practice demos for bboss modules.You can find many simple examples for bboss mvc,bboss ioc,bboss persistent…☆10Jan 7, 2026Updated 2 months ago
- Client for swgohNet - api.swgoh.help updating network☆12Jan 14, 2020Updated 6 years ago
- Get-UnJlaive is tool which is able to reconstruct Jlaive (.NET Antivirus Evasion Tool (Exe2Bat)) to original Assembly and stub Assembly.☆22May 19, 2022Updated 3 years ago
- Simple script realizado en bash, para revisión de múltiples hosts para CVE-2022-1388 (F5)☆25May 5, 2022Updated 3 years ago
- ☆13Jul 29, 2024Updated last year
- Central IoC scanner based on Loki☆20Nov 12, 2021Updated 4 years ago
- SubEvil is an advanced open source intelligence framework (OSINT) for grouping subdomains.☆110Jul 31, 2023Updated 2 years ago
- Awesome BLE Hack repository☆12Apr 7, 2019Updated 6 years ago