OSINT tool researched and designed to hunt down IG handles
☆57Mar 2, 2026Updated this week
Alternatives and similar repositories for IG-Detective
Users that are interested in IG-Detective are comparing it to the libraries listed below
Sorting:
- LLM agent solving traces, leaderboards, and benchmark results across security CTF and hacking platforms☆48Updated this week
- See updated code here: https://github.com/rjackowens/ebay-auction-dashboard☆13Nov 21, 2019Updated 6 years ago
- From Patch to PoC☆30Nov 19, 2025Updated 3 months ago
- LLMON 🍋 - The World's First Web Adversarial AI Firewall☆40Jan 3, 2026Updated 2 months ago
- Machine learning enabled dropper☆28May 1, 2023Updated 2 years ago
- Golang Automation Framework for Cobalt Strike using the Rest API☆56Dec 4, 2025Updated 3 months ago
- ☆10Updated this week
- Crane POAM Automation Tool (C-PAT™)☆15Feb 24, 2026Updated last week
- ☆19Nov 18, 2024Updated last year
- Red-Team - AI Agent to Phish Employees based on Social Intelligence.☆22Dec 28, 2025Updated 2 months ago
- Empower your enumeration during OSCP☆36Dec 7, 2018Updated 7 years ago
- Leaky is a powerful toolkit designed to import, manage, search, and visualize massive data leaks including stealer logs, credential dumps…☆47Feb 19, 2026Updated 2 weeks ago
- 为初学者开发的爆破靶场。☆29Nov 28, 2025Updated 3 months ago
- FedRAMP Documentation☆46Updated this week
- A Repository for Miscellaneous Scripts☆11Jul 18, 2014Updated 11 years ago
- A basic implementation of a (test) pattern generator from the HDMI output of an raspberry pi.☆12May 7, 2024Updated last year
- Compliance-to-Policy (C2P) provides the framework to bridge the gap between compliance and policy administration in Go.☆24Updated this week
- Open Data and sources for OSINT in Tajikistan☆13Jan 17, 2025Updated last year
- The Eureka Lab Series is designed for learners at all levels of experience and interest in security concepts and technologies.☆10Nov 30, 2025Updated 3 months ago
- ☆14Jan 7, 2026Updated last month
- Integrates Ganache and Harmony in a seamless setup☆10Sep 12, 2021Updated 4 years ago
- Fixes corrupted Magic Bytes for PNG, JPG and JPEG☆10Aug 4, 2021Updated 4 years ago
- A prompt-based pipeline for finding, validating, and proving vulnerabilities using LLM sub-agents.☆41Feb 22, 2026Updated last week
- Aliasr is a modern, feature-rich TUI launcher for penetration testing commands inspired by Arsenal, but with significantly improved funct…☆98Updated this week
- A Vulnerablity Radar That Runs With GIthub Actions☆44Updated this week
- Install guide for putting Debian GNU/Linux on a PogoPlug Pro☆10Jan 19, 2023Updated 3 years ago
- Terraform modules for cloud.gov managed services☆14Feb 25, 2026Updated last week
- ☆10Oct 12, 2021Updated 4 years ago
- ☆24Feb 5, 2026Updated last month
- A Docker lab integrating Splunk SIEM with Ollama LLM via Model Context Protocol for AI-powered security operations. Features Promptfoo e…☆18Aug 17, 2025Updated 6 months ago
- PrettyRecon-cli is an unofficial cli client for PrettyRecon. This tool can be used to trigger various tasks on prettyrecon as well as fe…☆10May 9, 2025Updated 9 months ago
- 🌈 Render PowerShell in the Terminal with Syntax Highlighting☆10May 25, 2023Updated 2 years ago
- Code-less Editor☆10Mar 28, 2022Updated 3 years ago
- A BugBounty playbook covering vulnerability bypasses, payloads, and quick checks for OWASP Top 10 + extras.☆22Sep 29, 2025Updated 5 months ago
- Memory and Context Orchestration for Coding Agents☆28Updated this week
- bash script to prepare Debian machines for OSINT use☆11Apr 10, 2020Updated 5 years ago
- P2P Communications of Named Pipes☆12Dec 11, 2025Updated 2 months ago
- ☆18Sep 9, 2025Updated 5 months ago
- ☆11Jun 5, 2022Updated 3 years ago