Ray M.'s repositories
rss-extension
RSS and Atom feeds for your Bolt 5 site
androidlockcracker
Python script for cracking and generating Android locks
Australia-OSINT
Australian Open Source Intelligence Gathering Resources, Australias Largest Open Source Intelligence Repository for Cyber Professionals and Ethical Hackers
Android-PIN-Bruteforce
Unlock an Android phone (or device) by bruteforcing the lockscreen PIN. Turn your Kali Nethunter phone into a bruteforce PIN cracker for Android devices! (no root, no adb)
Deepfake-Detection
The Pytorch implemention of Deepfake Detection based on Faceforensics++
python-deepfake-scanner
Deepfake Scanner by Deepware.
symfony-2fa
Two-factor authentication for Symfony applications 🔐
twig-switch-extension
Provides a {% switch %} tag for Twig switch case statements
php-currency-converter
Standardized wrapper for popular currency rate APIs. Currently supports FixerIO, CurrencyLayer, Open Exchange Rates and Exchange Rates API.
DownloadedImagesExifReader
A script that downloads images from webpages and extracts their EXIF metadata
malware_demos
Understand the nature of malicious software with practical examples in Python.
sherlock
🔎 Hunt down social media accounts by username across social networks
dpo-php
A PHP package to simplify using DPO Payment API in your application. https://dpogroup.com
manipulated-media-detector
Autopsy plugin to detect photo and video manipulations.
windows-command-line-obfuscation
Project for identifying executables that have command-line options that can be obfuscated, possibly bypassing detection rules.
ALEAPP
Android Logs Events And Protobuf Parser
o365_dataset
A dataset containing Office 365 Unified Audit Logs for security research and detection
sendgrid-php
The Official Twilio SendGrid Led, Community Driven PHP API Library
EagleEye
Stalk your Friends. Find their Instagram, FB and Twitter Profiles using Image Recognition and Reverse Image Search.
Office-365-Extractor
The Office 365 Extractor is a tool that allows for complete and reliable extraction of the Unified Audit Log (UAL)
awesome-ctf
A curated list of CTF frameworks, libraries, resources and softwares
Business-Email-Compromise-Guide
The Business Email Compromise Guide sets out to describe 10 steps for performing a Business Email Compromise (BEC) investigation in an Office 365 environment. Each step is intended to guide the process of identifying, collecting and analysing activity associated with BEC intrusions.
awesome-forensicstools
Awesome list of digital forensic tools
o365-attack-toolkit
A toolkit to attack Office365
evilginx2
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
users
Bolt users extension.
googleanalyticswidget
A bolt 4 widget, to display Google Analytics stats on your dashboard
twint
An advanced Twitter scraping & OSINT tool written in Python that doesn't use Twitter's API, allowing you to scrape a user's followers, following, Tweets and more while evading most API limitations.