SughoshKulkarni / WildWav
Bird sound identification web application
☆9Updated last year
Related projects: ⓘ
- YARA rule-based automation system to detect network attacks at byte-level☆15Updated 3 years ago
- This is a simple network scanner used to scan any range of IP Address to get their MAC Address. The code is written completely in Python …☆19Updated 3 years ago
- Python script that automate the process of generating various reverse shells.☆16Updated 3 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆16Updated 3 years ago
- Yet another powerful payload encoder/decoder☆12Updated 2 years ago
- 📝 Instagram Info Scraper☆14Updated 3 years ago
- ☆11Updated this week
- A brute-force password cracker and video auto-downloader for Zoom's "Record to Cloud" functionality.☆7Updated 4 years ago
- Looto - muilti-thread port scanner with powerful user-friendly GUI. Scan your network to be sure you are safe. This software can use ONLY…☆11Updated 3 years ago
- ☆10Updated this week
- AliGuard PHP WAF☆11Updated 7 months ago
- ☆10Updated this week
- ☆11Updated this week
- The lazy box is developed for setting up a good testing environment for infosec peoples easily. Mostly this box has all the necessary lib…☆12Updated 2 years ago
- ☆13Updated this week
- Post-Auth RCE & Persistence on UOKOO Security Cameras☆11Updated 3 years ago
- ☆10Updated this week
- ☆8Updated 3 years ago
- NooB PyThon Matasploit Av Bypasser By Ali khan☆8Updated 3 years ago
- ☆20Updated this week
- BruteProxy.py framework for brute-forcing via HTTP/HTTPS requests with looping proxies.☆12Updated 3 months ago
- Automate Recon process using Shell Scripting☆11Updated 2 years ago
- Extract endpoints from specific Git repository for fuzzing☆21Updated 3 years ago
- The NSE Script plugin integrates with Criminal IP CTI search engine for network scanning, showing IP details like WHOIS, running products…☆10Updated 9 months ago
- Phishing can't get any easier with Tilapia☆11Updated last year
- Bludit <= 3.9.2 - Authentication Bruteforce Mitigation Bypass☆14Updated 4 years ago
- ☆18Updated this week
- ☆14Updated this week
- fully automated c# reverse shells with automated ssh tunneling☆5Updated 3 years ago