mediaforensics / mediforLinks
Media Forensics one-shot protocol, service wrapper, and basic client tools.
☆13Updated 2 years ago
Alternatives and similar repositories for medifor
Users that are interested in medifor are comparing it to the libraries listed below
Sorting:
- A FREE course that takes you step-by-step through building a custom Automation Ansible Framework from scratch.☆22Updated 3 weeks ago
- Tool to extract contents from the memory of Windows systems.☆13Updated 2 years ago
- Assembler tinkering happens here. All your bytes are belong to us.☆13Updated 8 years ago
- Get a number of your tweets from the Twitter API.☆10Updated 3 years ago
- ☆20Updated last year
- Catalog Red Team techniques that cause popups in various macOS versions☆15Updated last year
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆15Updated last year
- Vulnerabilities advisories and PoC☆18Updated 3 weeks ago
- ☆11Updated 2 years ago
- Build your own cloud virtual machine lab☆12Updated 3 weeks ago
- Digital Forensics date and time☆23Updated 3 weeks ago
- ☆18Updated 2 years ago
- Simple and efficient file shredding☆14Updated 6 years ago
- Central repo for talks and presentations☆47Updated last year
- A Reverse Engineering Assistant leveraging Retrieval-Augmented Generation (RAG) and the LLaMA-3.1-8B-Instant Large Language Model (LLM). …☆36Updated 3 weeks ago
- LLM prompt attacks for hacker CTFs via CTFd.☆16Updated 2 years ago
- TikTok Scraper. Download video posts, collect user/trend/hashtag/music feed metadata, sign URL and etc.☆46Updated 4 years ago
- This tool bruteforces the file offset and base load address for a raw binary program file☆15Updated 7 months ago
- Scapy tools and scripts☆20Updated 5 years ago
- Scoring tools for Media Forensics Evaluations☆27Updated 4 years ago
- A pure python, post-exploitation, data mining tool and remote administration tool for macOS. 🍎💻☆11Updated 8 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆13Updated 3 years ago
- General research for Dreadnode☆27Updated last year
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Updated 3 years ago
- details about DIAL protocol vulnerabilities☆29Updated 2 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆16Updated 4 years ago
- Exploits of different CVE IDs (CVE-2021-37910, CVE-2021-40288, CVE-2021-41435, CVE-2021-41436, CVE-2021-41437, CVE-2021-41441, CVE-2021-4…☆17Updated 3 years ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆48Updated 3 years ago
- My inputs for the LLM Gandalf made by Lakera☆48Updated 2 years ago
- A fast GitHub stargazers information gathering tool☆72Updated 3 years ago