Capturing audio (.wav) from target using a link
☆12Feb 21, 2020Updated 6 years ago
Alternatives and similar repositories for sayhello
Users that are interested in sayhello are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Swift Memoize Macro: Effortless function memoization in Swift 👾☆14Jun 25, 2024Updated last year
- Tools Instagram (Features: Delete All Photo, Unfollow All Following, Unfollow Not FollowBack, and Much More)☆14Jun 30, 2018Updated 7 years ago
- i2p c++ implementation☆19Feb 21, 2015Updated 11 years ago
- A simple educational Kotlin JSON parser: https://dev.to/y9san9/json-parsing-from-scratch-in-kotlin-4al8☆20Sep 1, 2023Updated 2 years ago
- ☆20Jul 5, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- VK bot для сноса бесед☆11Feb 7, 2021Updated 5 years ago
- Swoops down and creates your Perl 6 project Makefile for you☆27Apr 25, 2017Updated 8 years ago
- zfs posix layer for linux☆24Apr 8, 2011Updated 14 years ago
- live.linuX-gamers live gaming distro☆17May 9, 2011Updated 14 years ago
- Build a custom nixos installation iso from any os with the help of vagrant☆16Jul 29, 2021Updated 4 years ago
- Program to detect and remove the root level SSL certificates installed by NCALayer program☆14Jul 19, 2019Updated 6 years ago
- OpenCart is designed feature rich, easy to use, search engine friendly and with a visually appealing interface.☆12Feb 16, 2016Updated 10 years ago
- forth-assembler for AVR☆15Jan 13, 2020Updated 6 years ago
- Nix Packages collection☆12Feb 10, 2020Updated 6 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- О сниферах в московском метро и бранчах блоклистов РКН☆28Dec 1, 2019Updated 6 years ago
- A specialized audio CD-ripper optimized for track recovery.☆32Mar 10, 2026Updated 2 weeks ago
- PC Park observer☆17Apr 14, 2024Updated last year
- https://github.com/yeyintminthuhtut/Awesome-Red-Teaming☆17Jan 15, 2022Updated 4 years ago
- ☆17Jul 18, 2020Updated 5 years ago
- ☆16Jul 25, 2018Updated 7 years ago
- package for working with webmoney xml interfaces☆15Mar 20, 2026Updated last week
- Plan9 based kernel in Rust☆20Jun 16, 2019Updated 6 years ago
- This is a guide on how to set up your own Cydia Repository☆32May 29, 2020Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆22May 9, 2024Updated last year
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- A binary analysis tool for linux☆71Jun 2, 2020Updated 5 years ago
- Framework for automated ebuild generators☆27May 3, 2021Updated 4 years ago
- IP camera bruteforcer, 32 bit version☆14Mar 24, 2016Updated 10 years ago
- Prevent expiration of signed iOS applications & bypass 3 free signed applications per device limit☆47Feb 2, 2017Updated 9 years ago
- A malicious .cab creation tool for CVE-2021-40444☆13Sep 12, 2021Updated 4 years ago
- Everything☆57Mar 4, 2026Updated 3 weeks ago
- Collection of multiplatofrm string tools that does not exist on all platforms with the same interface: string and datetime formatting, et…☆54Dec 14, 2025Updated 3 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Programming in Haskell by Graham Hutton☆17Nov 28, 2014Updated 11 years ago
- Black Hat Python:PYTHON PROGRAMMING FOR HACKERS AND PENTESTERS by justin seitz☆51Sep 26, 2018Updated 7 years ago
- Quick OSINT checks for IPs and Domains during triage and investigations.☆31Updated this week
- op: controlled privilege escalation (a flexible alternative to sudo)☆34Apr 13, 2017Updated 8 years ago
- Analysis and exploitation of an use-after-free in ProFTPd☆12Jun 21, 2023Updated 2 years ago
- twister dns seeder☆51Dec 16, 2023Updated 2 years ago
- The objective of Smart File Hunter (SFH) is the efficient identification of files containing sensitive information like passwords or priv…☆14Sep 3, 2022Updated 3 years ago