Code and result files (models, etc.) related to Metadata Digger's parts using Artificial Intelligence methods.
☆12Feb 4, 2020Updated 6 years ago
Alternatives and similar repositories for metadata-digger-ai
Users that are interested in metadata-digger-ai are comparing it to the libraries listed below
Sorting:
- Search-Scan-Save-Notify☆11May 12, 2025Updated 9 months ago
- Yandex browser password recovery☆11Apr 9, 2025Updated 10 months ago
- PRESTASHOP Modules Shell Exploit☆11Sep 9, 2017Updated 8 years ago
- Converts binary files of 1C (1CD, cf, epf, efd, etc.) to grepable CSV☆12Feb 12, 2024Updated 2 years ago
- vusialization of geo points from photos from vk profile☆48Feb 16, 2022Updated 4 years ago
- Forensic Imaging quickstarts!☆13Aug 12, 2022Updated 3 years ago
- PoC for CVE-2021-3129 (Laravel)☆12Oct 9, 2021Updated 4 years ago
- ☆10May 15, 2020Updated 5 years ago
- POC for scanning ProxyShell(CVE-2021-34523,CVE-2021-34473,CVE-2021-31207)☆16Oct 6, 2021Updated 4 years ago
- ☆11May 6, 2021Updated 4 years ago
- Linux kernel LPE practice with an NPD vulnerability☆36Jul 11, 2023Updated 2 years ago
- Tenssens framework focused on gathering information from free tools or resources. The intention is to help people find free OSINT resourc…☆68Jan 13, 2022Updated 4 years ago
- A collection of awesome penetration testing resources☆13Jan 13, 2019Updated 7 years ago
- 1/ An0nymousF0x-V4 2/ DorkBull 3/ JEX_V5 4/ JaguarV3 5/ Mass Bing Grab sites 6/ NekoBot 7/ PayloadV3 8/ Raiz0w0rm 9/ Vipe…☆41May 18, 2022Updated 3 years ago
- ☆17Oct 12, 2020Updated 5 years ago
- ☆16Jul 25, 2018Updated 7 years ago
- ☆13Jan 25, 2020Updated 6 years ago
- Brute force tool for telnet and ssh, programmed in python (with Zmap)☆13Jul 3, 2019Updated 6 years ago
- Exploits for some of the vulnerabilities I have discovered☆19Aug 3, 2020Updated 5 years ago
- Log4j2 CVE-2021-44228 revshell, ofc it suck!!☆18Dec 21, 2021Updated 4 years ago
- Guide to searching in different file types (documents, breaches, databases, etc.)☆53May 11, 2024Updated last year
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Apr 3, 2024Updated last year
- List of Hardware Wallets for Digital Forensics☆26Dec 19, 2024Updated last year
- Framework for Telegram users and chats investigating☆74Jun 5, 2025Updated 9 months ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆102May 11, 2022Updated 3 years ago
- Qiwi у тебя в терминале! (Бета версия)☆11May 5, 2021Updated 4 years ago
- Airgapped ECC text messenger☆39Nov 28, 2025Updated 3 months ago
- A daemonized DDexec.☆30Mar 22, 2025Updated 11 months ago
- Query GraphSense clusters, details and attribution tag-packs directly in Maltego. By an initial idea of our Swiss Federal Police colleag…☆36Dec 28, 2024Updated last year
- ☆69May 3, 2021Updated 4 years ago
- Capturing audio (.wav) from target using a link☆12Feb 21, 2020Updated 6 years ago
- Event Masker is a Splunk streaming command to mask event from search based on a list of rules that contain conditions.☆16Oct 11, 2022Updated 3 years ago
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆29Sep 18, 2024Updated last year
- Maltego transformation for searching of accounts by username☆80Feb 15, 2022Updated 4 years ago
- Dump place details from Google Maps like phone,email,website,and reviews☆73Jun 3, 2025Updated 9 months ago
- Cisco IOS Security Inspector☆39Dec 29, 2025Updated 2 months ago
- Quick Cache and Archive search buttons☆39May 11, 2024Updated last year
- Maltego transform for hunter.io☆40Apr 28, 2021Updated 4 years ago
- ☆11Oct 14, 2020Updated 5 years ago