The following code when compiled in go takes a domain name as an argument and outputs an HTML file with Google Search links for various document types. Each link opens the results in a new tab
☆17Sep 11, 2024Updated last year
Alternatives and similar repositories for Meta-Detector
Users that are interested in Meta-Detector are comparing it to the libraries listed below
Sorting:
- UDC2 implementation that provides an ICMP C2 channel☆115Nov 24, 2025Updated 3 months ago
- Burp Suite extension for API security testing with 15 attack types, 108+ payloads, intelligent fuzzing, BOLA/IDOR detection, AI integrati…☆48Dec 30, 2025Updated 2 months ago
- ☆15Sep 21, 2019Updated 6 years ago
- ☆27Nov 7, 2023Updated 2 years ago
- Hola Tokens [ERC-20]☆12Feb 11, 2021Updated 5 years ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Apr 15, 2024Updated last year
- A-Rat = Remote access tool we can generate python based rat installation : $ apt update $ apt upgrade $ apt install git $ apt inst…☆14Aug 29, 2020Updated 5 years ago
- A user enumeration tool for Slack.☆36Jun 10, 2024Updated last year
- A python library to create BloodHound OpenGraphs☆53Feb 4, 2026Updated last month
- ☆36Aug 21, 2024Updated last year
- ☆10Feb 23, 2026Updated last week
- ☆11May 6, 2019Updated 6 years ago
- Spanning Backup for Office 365 REST API PowerShell Module☆12Oct 30, 2023Updated 2 years ago
- ☆39Sep 18, 2023Updated 2 years ago
- A distributed hashcat implementation using Salad Cloud and Hashtopolis☆41Jul 11, 2024Updated last year
- An HTA Application which builds Azure (Entra) Scenarios for Red Team Simulations☆61Aug 18, 2025Updated 6 months ago
- Updated version of n0kovo's Rule List☆44Jan 29, 2026Updated last month
- OSINT tool to evaluate the trustworthiness of a company☆41Dec 7, 2019Updated 6 years ago
- Combine words from two wordlist files and concatenate them with an optional delimiter☆38Sep 25, 2023Updated 2 years ago
- Nothing☆11Jan 8, 2025Updated last year
- Regex based secret scanner for sccm deployment points sccmcontentlib$ shares. Find secrets automatically and download entire packages for…☆18Aug 13, 2025Updated 6 months ago
- The OWASP Testing Guide v4.2 Checlist [2023]☆13Jan 15, 2023Updated 3 years ago
- ☆20Feb 18, 2021Updated 5 years ago
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- Remove NotebookLM watermarks from slides. Local processing, no upload needed.☆35Jan 15, 2026Updated last month
- Simple .NET assembly to interact with services.☆43Sep 27, 2019Updated 6 years ago
- Want to crack passwords faster by using a wordlist that fits your 'target audience'? Use WikiRaider.☆45Feb 2, 2024Updated 2 years ago
- Sysmon Tools for PowerShell☆12Aug 17, 2018Updated 7 years ago
- ☆10Sep 22, 2022Updated 3 years ago
- ☆11Apr 1, 2025Updated 11 months ago
- A tool to sync mythic events with ghostwriter oplog.☆14Nov 21, 2024Updated last year
- Simple, realtime JACK audio in Node.JS☆13Oct 20, 2014Updated 11 years ago
- Legacy Rucky Binaries☆10Feb 11, 2020Updated 6 years ago
- ☆16Dec 7, 2025Updated 2 months ago
- Packages using the X Window System.☆12Feb 9, 2019Updated 7 years ago
- Add tracking hidden image to Word documents☆16Aug 30, 2017Updated 8 years ago
- Gathering All Nuclei Fuzzing Templates in a Single Repo.☆11Apr 23, 2024Updated last year
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆17Jun 22, 2024Updated last year
- The Public Physical Pentesting Paraphernalia Project (P5) is a collection of 3D printing models, DIY tool instructions and entry-level me…☆12Sep 6, 2019Updated 6 years ago