data-hunters / metadata-digger-aiView external linksLinks
Code and result files (models, etc.) related to Metadata Digger's parts using Artificial Intelligence methods.
☆12Feb 4, 2020Updated 6 years ago
Alternatives and similar repositories for metadata-digger-ai
Users that are interested in metadata-digger-ai are comparing it to the libraries listed below
Sorting:
- Search-Scan-Save-Notify☆11May 12, 2025Updated 9 months ago
- Yandex browser password recovery☆11Apr 9, 2025Updated 10 months ago
- PRESTASHOP Modules Shell Exploit☆11Sep 9, 2017Updated 8 years ago
- Converts binary files of 1C (1CD, cf, epf, efd, etc.) to grepable CSV☆12Feb 12, 2024Updated 2 years ago
- vusialization of geo points from photos from vk profile☆48Feb 16, 2022Updated 3 years ago
- PoC for CVE-2021-3129 (Laravel)☆12Oct 9, 2021Updated 4 years ago
- ☆16Feb 12, 2022Updated 4 years ago
- Forensic Imaging quickstarts!☆13Aug 12, 2022Updated 3 years ago
- ☆10May 15, 2020Updated 5 years ago
- POC for scanning ProxyShell(CVE-2021-34523,CVE-2021-34473,CVE-2021-31207)☆16Oct 6, 2021Updated 4 years ago
- ☆11May 6, 2021Updated 4 years ago
- Linux kernel LPE practice with an NPD vulnerability☆36Jul 11, 2023Updated 2 years ago
- Tenssens framework focused on gathering information from free tools or resources. The intention is to help people find free OSINT resourc…☆68Jan 13, 2022Updated 4 years ago
- A collection of awesome penetration testing resources☆13Jan 13, 2019Updated 7 years ago
- the metasploit script(POC/EXP) about CVE-2021-22005 VMware vCenter Server contains an arbitrary file upload vulnerability☆22Oct 2, 2021Updated 4 years ago
- ☆13Jan 25, 2020Updated 6 years ago
- ☆17Oct 12, 2020Updated 5 years ago
- https://github.com/yeyintminthuhtut/Awesome-Red-Teaming☆16Jan 15, 2022Updated 4 years ago
- Exploits for some of the vulnerabilities I have discovered☆19Aug 3, 2020Updated 5 years ago
- Log4j2 CVE-2021-44228 revshell, ofc it suck!!☆18Dec 21, 2021Updated 4 years ago
- List of Hardware Wallets for Digital Forensics☆26Dec 19, 2024Updated last year
- Guide to searching in different file types (documents, breaches, databases, etc.)☆53May 11, 2024Updated last year
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Apr 3, 2024Updated last year
- Framework for Telegram users and chats investigating☆75Jun 5, 2025Updated 8 months ago
- 👻 [PoC] CSV+ 0.8.0 - Arbitrary Code Execution (CVE-2022-21241)☆24Feb 11, 2022Updated 4 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆105May 11, 2022Updated 3 years ago
- Qiwi у тебя в терминале! (Бета версия)☆11May 5, 2021Updated 4 years ago
- Airgapped ECC text messenger☆37Nov 28, 2025Updated 2 months ago
- Query GraphSense clusters, details and attribution tag-packs directly in Maltego. By an initial idea of our Swiss Federal Police colleag…☆36Dec 28, 2024Updated last year
- ☆69May 3, 2021Updated 4 years ago
- Event Masker is a Splunk streaming command to mask event from search based on a list of rules that contain conditions.☆16Oct 11, 2022Updated 3 years ago
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆30Sep 18, 2024Updated last year
- Maltego transformation for searching of accounts by username☆79Feb 15, 2022Updated 4 years ago
- Dump place details from Google Maps like phone,email,website,and reviews☆72Jun 3, 2025Updated 8 months ago
- Cisco IOS Security Inspector☆40Dec 29, 2025Updated last month
- The telegram bot provides basic subscription for premium (non telegram premium, only bot's own). Uses some telegram payment methods☆10Mar 30, 2023Updated 2 years ago
- 😭 WSOB is a python tool created to exploit the new vulnerability on WSO2 assigned as CVE-2022-29464.☆27May 23, 2023Updated 2 years ago
- Maltego transform for hunter.io☆40Apr 28, 2021Updated 4 years ago
- Быстрый бан страницы ВК☆13Sep 1, 2020Updated 5 years ago