data-hunters / metadata-digger-ai
Code and result files (models, etc.) related to Metadata Digger's parts using Artificial Intelligence methods.
☆13Updated 4 years ago
Alternatives and similar repositories for metadata-digger-ai:
Users that are interested in metadata-digger-ai are comparing it to the libraries listed below
- Search-Scan-Save-Notify☆12Updated 3 years ago
- wpscvn is a tool for pentesters, website owner to test if their websites had some vulnerable plugins or themes☆15Updated 6 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated 10 months ago
- Free Advance encryptor for Anon Cloud☆17Updated 2 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆25Updated last year
- exfiltration/infiltration toolkit☆43Updated 2 months ago
- Command and Control Framework☆14Updated 10 months ago
- ☆11Updated 4 years ago
- Red Team Server (RTS)☆16Updated 10 months ago
- Automate All Pivoting System Enumeration with this Bash Script☆11Updated 2 years ago
- Script to setup a phishing server on the cloud☆12Updated 3 years ago
- Apache (Linux) CVE-2021-41773/2021-42013 Mass Vulnerability Checker☆22Updated 3 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆18Updated last year
- ☆27Updated last year
- Modular framework to exploit UPS devices☆62Updated last year
- VLAN ID Parser☆6Updated 8 months ago
- ☆56Updated last year
- Central IoC scanner based on Loki☆20Updated 3 years ago
- Analyzing AD domains for security risks related to user accounts☆63Updated 2 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆14Updated 8 months ago
- 1C RAS Offensive Security Tool☆24Updated last year
- karma WiFi attack implementation☆46Updated 3 months ago
- Simple 5060 port exploit that calls to a receiver device with pre-setuped phrase☆33Updated 2 years ago
- Port forwarding via MSRPC (445/tcp) [WIP]☆31Updated 3 years ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆24Updated 2 years ago
- A simple python script to exploit vulnerable Firebase Database. If the owner of the app have set the security rules as true for both "rea…☆20Updated 9 months ago
- Enumeration & fingerprint tool☆24Updated 10 months ago