Remove EXIF data from all objects in an S3 bucket
☆16Mar 16, 2021Updated 4 years ago
Alternatives and similar repositories for S3-Exif-Cleaner
Users that are interested in S3-Exif-Cleaner are comparing it to the libraries listed below
Sorting:
- AWS managed IAM policies☆16Mar 24, 2022Updated 3 years ago
- DevSecOps command line asset inventory tool☆30Oct 2, 2023Updated 2 years ago
- AWS S3 Sensitive Data Search☆35Jan 16, 2022Updated 4 years ago
- Common code, such as validators and mixins, that are shared between ActiveModels in metasploit-framework and ActiveRecords in metasploit_…☆14May 2, 2025Updated 10 months ago
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- Most Popular Attack and Defend Competitive A/D mode for 5 years!☆12Feb 5, 2018Updated 8 years ago
- Script to run after a Debian based install (Ubuntu, Kali, Raspberry Pi...)☆10Sep 20, 2025Updated 5 months ago
- Automate ISSG Tool Setups☆13Nov 21, 2024Updated last year
- Fluxion is a easy to use wifi cracker, to test your own network☆11Feb 8, 2017Updated 9 years ago
- PowerShell scripts to aid investigators when utilizing O365 and Magnet Axiom.☆12Aug 26, 2024Updated last year
- GCNotify is an Outlook addin for quickly forwarding mail as attachment to a pre-defined e-mail address.☆12Jan 17, 2023Updated 3 years ago
- Find out cryptocurrency arbitrage opportunities across exchanges. (No Fiat withdrawal involved)☆11Jan 30, 2018Updated 8 years ago
- Enhanced version of finddupe, a duplicate file detector for Windows☆11Dec 31, 2025Updated 2 months ago
- ☆10Nov 21, 2023Updated 2 years ago
- ☆10May 21, 2024Updated last year
- Various Crypter Project☆10Feb 26, 2014Updated 12 years ago
- Library for Object Linking and Embedding (OLE) data types☆12Nov 27, 2025Updated 3 months ago
- Small and highly portable detection tests.☆12Oct 12, 2017Updated 8 years ago
- Example of querying a CSV file in AmazonS3 using S3 Select☆11May 8, 2018Updated 7 years ago
- Golang tool to scan hosts for SMB version and signing status☆15Nov 19, 2024Updated last year
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- Mimikatz embedded as classes☆28Oct 25, 2021Updated 4 years ago
- .Net Core library for cryptocurrency trading with support for many exchanges on the Bitcoin and Ethereum blockchains☆11Aug 27, 2025Updated 6 months ago
- The Second Version of Car Demo☆12Jan 6, 2023Updated 3 years ago
- A collection of scripts designed to secure/harden Linux based distributions☆12Nov 2, 2025Updated 4 months ago
- Bash scripts for use on Linux for minting Cardano NFTs☆12Aug 2, 2022Updated 3 years ago
- public domain usb hacking logos☆12Sep 23, 2021Updated 4 years ago
- Run PowerShell command without invoking powershell.exe☆12Sep 2, 2017Updated 8 years ago
- Terraform playbook of a vulnerable Azure deployment☆10Apr 28, 2022Updated 3 years ago
- Scoring engine for cyber defense competitions☆10Jan 30, 2022Updated 4 years ago
- bash script to prepare Debian machines for OSINT use☆11Apr 10, 2020Updated 5 years ago
- I2P monitor and control application for Mac OS X☆11Jul 10, 2016Updated 9 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Jun 9, 2019Updated 6 years ago
- Disk Image Mounting Script☆11Jan 22, 2026Updated last month
- A sub-domain reconnaissance written in golang☆12Jan 11, 2018Updated 8 years ago
- Change your DNS from the toolbar in OSX (10.9+)☆17Mar 16, 2017Updated 8 years ago
- A curated list of CTF frameworks, libraries, resources and softwares☆10Nov 11, 2015Updated 10 years ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Jan 21, 2020Updated 6 years ago
- Remote Administration Tool☆10Mar 27, 2025Updated 11 months ago