Find data about you or an individual from various online public records
☆30May 26, 2017Updated 8 years ago
Alternatives and similar repositories for person-of-interest
Users that are interested in person-of-interest are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Web Help Desk Hardcoded Credential Vulnerability (CVE-2024-28987)☆12Sep 5, 2024Updated last year
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆15Apr 5, 2019Updated 6 years ago
- his program shows you IMSI numbers, country, brand and operator of cellphones around you. /!\ This program was made to understand how GS…☆13Dec 27, 2018Updated 7 years ago
- A script that is used to generate a pair of soft jaws for machining a part.☆16Oct 2, 2025Updated 5 months ago
- crawl a website for links and expose all the vulnerable parameters.☆14Oct 2, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- PHP CGI Argument Injection (CVE-2024-4577) RCE☆25Aug 20, 2024Updated last year
- Magical Bulk Whois (No CAPTCHA!) 🪄🪄🪄🪄🪄🚀🚀🚀🚀🚀☆14Jun 23, 2023Updated 2 years ago
- ☆10Apr 2, 2022Updated 3 years ago
- Some NSE scripts to search information from routers☆10Nov 18, 2015Updated 10 years ago
- Combined Worldlist from various projects Including Seclists, fuzzdb and other Database Management Tools☆19May 20, 2020Updated 5 years ago
- Unlock an Android phone (or device) by bruteforcing the lockscreen PIN. Turn your Kali Nethunter phone into a bruteforce PIN cracker for …☆15Mar 4, 2023Updated 3 years ago
- Generator for fake ID barcodes. (Currently SC only, looking to expand).☆32Jan 5, 2015Updated 11 years ago
- Bash one-liners for great justice!☆12Feb 9, 2019Updated 7 years ago
- A configuration that uses docker-compose to deploy docassemble container, maintain and manage it☆11May 3, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Rizzyscope: Wireless Signal Strength Monitor☆12Aug 30, 2025Updated 7 months ago
- Close your Zoom meeting tabs automatically☆20Apr 14, 2024Updated last year
- An assistant for YNAB to scrape chase transaction and amazon order emails into YNAB transactions and apply custom categorization rules.☆10Mar 5, 2021Updated 5 years ago
- CyberSpy is a repository with innate and third party services that can be used for doxing, profiling & identity searching.☆11Jul 8, 2019Updated 6 years ago
- Abuse adapts to technology. You deserve privacy and compassion.☆13Mar 26, 2017Updated 9 years ago
- Security investigation of Besder 6024PB-XMA501 IP camera.☆26Mar 5, 2026Updated 3 weeks ago
- This is the list of all rootkits found so far on github and othersites.☆30Dec 7, 2020Updated 5 years ago
- WpDisect is a wordpress hacking tool that finds vulnerabilities in wordpress.☆14Feb 20, 2022Updated 4 years ago
- Its the programmed ATM card that can hack into all ATM machines. Its works with any currency and in any country where you might be living…☆10May 15, 2016Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆12Oct 5, 2025Updated 5 months ago
- 3D printed mini circular table saw.☆11Jul 19, 2014Updated 11 years ago
- A tool to make Extensify ipa files sideload-able☆12Mar 24, 2017Updated 9 years ago
- Soft and Hard Unlocks everything in Combat Master all using melon loader☆11Sep 11, 2024Updated last year
- 🌐 Devploit v 2.3 Information Gathering Tool🕵️☆17Apr 28, 2018Updated 7 years ago
- ZSH plugin who create file from template☆15Apr 24, 2020Updated 5 years ago
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆18Aug 20, 2023Updated 2 years ago
- Writeups for Hack The Box machines/challenges☆25Nov 4, 2021Updated 4 years ago
- Tools for baiting phone-tech-support-scammers☆23Apr 20, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A neural network library for natural language processing written in pure Clojure☆10Jul 30, 2018Updated 7 years ago
- demo material for my PowerShell Scripting Secrets presentation☆15Nov 20, 2017Updated 8 years ago
- ☆15Jul 30, 2022Updated 3 years ago
- TracklessURL is a Python-based tool that automatically removes tracking parameters from URLs you copy. With customizable rules stored in …☆16Jan 31, 2025Updated last year
- Notes and activity code for the "Python 3: Data cleaning and visualization with pandas and matplotlib" session at the 2018 NICAR conferen…☆11Jun 1, 2021Updated 4 years ago
- Bash script to resign ipa files☆13May 20, 2019Updated 6 years ago
- MEMEX Weapons Pilot for the illegal weapons domain.☆15May 20, 2016Updated 9 years ago