mediaforensics / mediforLinks
Media Forensics one-shot protocol, service wrapper, and basic client tools.
☆13Updated 2 years ago
Alternatives and similar repositories for medifor
Users that are interested in medifor are comparing it to the libraries listed below
Sorting:
- Assembler tinkering happens here. All your bytes are belong to us.☆13Updated 8 years ago
- ☆51Updated 2 years ago
- The Privacy Adversarial Framework (PAF) is a knowledge base of privacy-focused adversarial tactics and techniques. PAF is heavily inspire…☆58Updated 2 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago
- Zombie Content management systems exploitation Bot Source☆10Updated 3 years ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.☆15Updated 3 years ago
- A Golang tool to whitelist ASN's based on organization name☆16Updated 3 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆37Updated 4 years ago
- Toolset to examine iDevices for Security / Safety Threats☆22Updated 2 years ago
- Catalog Red Team techniques that cause popups in various macOS versions☆15Updated 9 months ago
- ☆74Updated 5 months ago
- Fuzz Network Traffic☆18Updated 8 months ago
- A utility to inspect, validate, sign and verify machine learning model files.☆58Updated 7 months ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆17Updated 4 years ago
- ☆14Updated last year
- ☆26Updated 2 years ago
- Use onion scan to detect the dark net web service, This Repo Contained Recently Scan Results☆10Updated 6 years ago
- SwaraVM is a mobile security virtual machine that aggregates tools and resources that are commonly used for network traffic analysis, mal…☆30Updated 6 years ago
- ☆14Updated 3 years ago
- This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based o…☆14Updated 2 years ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆48Updated 3 years ago
- ☆35Updated 7 years ago
- BurpDroid is a web application debugging tool for Android and is often used for checking web application security. It’s a proxy-based too…☆11Updated 4 years ago
- wh cyberspace☆12Updated 2 years ago
- A toolkit for detecting and protecting against vulnerabilities in Large Language Models (LLMs).☆142Updated last year
- A FREE course that takes you step-by-step through building a custom Automation Ansible Framework from scratch.☆22Updated 5 months ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆17Updated 3 years ago
- ☆17Updated 2 years ago
- Prototype program to decode a video file looking for exploits/malware.☆17Updated 5 years ago
- x86_64 LKM linux rootkit☆16Updated 2 years ago