A simple python3 code to calculate the similarity ratio of people's voices & detect the same person
☆21Sep 15, 2023Updated 2 years ago
Alternatives and similar repositories for VoiceComparator
Users that are interested in VoiceComparator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆22Aug 11, 2024Updated last year
- a script containing hacktools that make it easier to use for termux☆14Apr 23, 2022Updated 3 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- a simple powershell wrapper to automate checking a user's access around the network☆13Dec 5, 2023Updated 2 years ago
- This repository will contain source codes from the Tradecraft improvement blog series☆15Mar 27, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- This script allows you to manage VPN configurations with ease. It fetches VPN configurations from VPNBook and connects to your selected V…☆14Jun 13, 2025Updated 10 months ago
- Run PowerShell command without invoking powershell.exe☆12Sep 2, 2017Updated 8 years ago
- PowerShell module to automate via XMLRPC a remote Metasploit server.☆15May 30, 2014Updated 11 years ago
- A library for creating wrappers around command-line programs.☆32Oct 6, 2022Updated 3 years ago
- Assorted scripts I made for Red Teaming / Pen Testing☆14Jun 15, 2024Updated last year
- BIXI is a fast, stable, and powerful DDoS tool designed for efficiency. It supports multiple protocols including TCP, UDP, ICMP, HTTP, an…☆10Apr 9, 2025Updated last year
- Powershell-based Windows Security Auditing Toolbox☆10Aug 28, 2017Updated 8 years ago
- ☆10Jul 8, 2024Updated last year
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆13Jan 19, 2023Updated 3 years ago
- Domaintools addon for Maltego☆15Sep 13, 2012Updated 13 years ago
- CLI-based 802.11 Rogue (Fake) AP & Hidden AP Spotter☆14Dec 26, 2025Updated 3 months ago
- Inject scripted keystrokes and mouse movements into remote desktop sessions, including VMware View, Amazon Workspaces, and Microsoft RDP.…☆17Jul 25, 2014Updated 11 years ago
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆18May 19, 2024Updated last year
- Tutorial on executing system commands within Obsidian using Templater and user definied functions.☆14Mar 12, 2023Updated 3 years ago
- Cracking PDF password protection via hashcat.☆16Dec 24, 2025Updated 3 months ago
- Some Cheat Sheet for Red Team☆17Dec 30, 2022Updated 3 years ago
- This is a project with .net server crypter for bypass AV's Runtime detection.☆11Sep 8, 2017Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- USB Rubber Ducky Wiki☆12Jan 18, 2019Updated 7 years ago
- Phishing Toolkit☆19Feb 20, 2018Updated 8 years ago
- This is a source mirror for 0trace.☆12Mar 4, 2014Updated 12 years ago
- A Microsoft Excel Add-in based on Excel-DNA which adds new user-defined functions (e.g. stock quote queries).☆15Dec 8, 2022Updated 3 years ago
- Static site server in node and a couple things to serve☆21Jul 22, 2016Updated 9 years ago
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Feb 6, 2023Updated 3 years ago
- ☆14Oct 25, 2022Updated 3 years ago
- A web-scraping interface to various Google Services.☆34Apr 27, 2012Updated 13 years ago
- Scan extracted file from Zeek with Yara rules and get statistical analysis for matching files. Optionally, simulate matching malicious fi…☆15Dec 18, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- IP addresses exploiting recent log4j2 vulnerability CVE-2021-44228☆16Dec 19, 2021Updated 4 years ago
- Swiss army knife for (web) security specialists.☆12Dec 13, 2017Updated 8 years ago
- Why hunt when you can seine?☆21May 12, 2015Updated 10 years ago
- Yaralyze is an malware detection tool for Android that relies on two types of static analysis, Yara rule analysis and hashes analysis.☆21Nov 13, 2022Updated 3 years ago
- An indoor positioning system running on WiFi access points.☆11Mar 24, 2018Updated 8 years ago
- Supporting resources and documentation for FLARE @ Google Summer of Code 2023☆16Feb 7, 2023Updated 3 years ago
- Hash passwords with the most costly Argon2 hash possible☆20Aug 7, 2022Updated 3 years ago