SughoshKulkarni / WildWav
Bird sound identification web application
☆10Updated 2 years ago
Alternatives and similar repositories for WildWav:
Users that are interested in WildWav are comparing it to the libraries listed below
- YARA rule-based automation system to detect network attacks at byte-level☆15Updated 3 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- Looto - muilti-thread port scanner with powerful user-friendly GUI. Scan your network to be sure you are safe. This software can use ONLY…☆11Updated 3 years ago
- Python script that automate the process of generating various reverse shells.☆15Updated 4 years ago
- A brute-force password cracker and video auto-downloader for Zoom's "Record to Cloud" functionality.☆8Updated 5 years ago
- ShellC0de Generator☆11Updated 3 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆11Updated 4 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated 2 years ago
- HTTP discovery and change monitoring tool☆12Updated 2 months ago
- NooB PyThon Matasploit Av Bypasser By Ali khan☆8Updated 4 years ago
- Development☆11Updated 4 years ago
- Python tool for vulnerability assessment and persistence.☆9Updated 4 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 4 years ago
- Yet another powerful payload encoder/decoder☆14Updated 3 years ago
- SSL/TLS vulnerability research☆10Updated 2 years ago
- ☆17Updated 3 years ago
- This is a simple network scanner used to scan any range of IP Address to get their MAC Address. The code is written completely in Python …☆21Updated 3 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Updated 4 years ago
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Updated 3 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Updated 11 months ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Updated 4 years ago
- Brute Force and Scan WinRm Service☆13Updated 5 years ago
- fully automated c# reverse shells with automated ssh tunneling☆5Updated 4 years ago
- The program allows to download large data from shodan quickly, simply and avoid errors.☆29Updated 4 years ago
- Spider or repeater to find all links.☆13Updated 4 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- Automation script for poland visa appointment booking☆3Updated 11 months ago
- CRACK AND CHECK HASH TYPES IN BULK☆12Updated 3 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆14Updated last year
- Windows productivity tweaks☆15Updated 5 years ago