SughoshKulkarni / WildWav
Bird sound identification web application
☆9Updated last year
Alternatives and similar repositories for WildWav:
Users that are interested in WildWav are comparing it to the libraries listed below
- YARA rule-based automation system to detect network attacks at byte-level☆15Updated 3 years ago
- Looto - muilti-thread port scanner with powerful user-friendly GUI. Scan your network to be sure you are safe. This software can use ONLY…☆11Updated 3 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated 2 years ago
- Python script that automate the process of generating various reverse shells.☆16Updated 3 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 3 years ago
- Exploitdb website search module written in python to ease you task ... No local db for exploitdb is need ...It just uses google dorks an…☆12Updated 5 years ago
- ☆17Updated 3 years ago
- NooB PyThon Matasploit Av Bypasser By Ali khan☆8Updated 4 years ago
- A brute-force password cracker and video auto-downloader for Zoom's "Record to Cloud" functionality.☆8Updated 4 years ago
- This is a simple network scanner used to scan any range of IP Address to get their MAC Address. The code is written completely in Python …☆20Updated 3 years ago
- Automation script for poland visa appointment booking☆3Updated 9 months ago
- MAC Address brute forcing tool, used to bypass MAC based filtering☆14Updated 2 years ago
- Python Keylogger PortScanner BruteForce and basic hack tools.(new ones will come soon)☆16Updated 3 years ago
- 📝 Instagram Info Scraper☆15Updated 3 years ago
- All Shell In One. Generate Reverse Shells and/or generate single code that runs all the payloads.☆11Updated 3 years ago
- HadoopLink是基于Hadoop及BaseMR进一步封装而来的工作链框架。该框架省去了您生成Job,JobControl,ContrlledJob的繁杂重复代码。同时您可以非常便捷的通过注释设置MapReduce任务之间的依赖关系。HadoopLink支持多个任务链并…☆11Updated 5 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆11Updated 4 years ago
- Development☆11Updated 3 years ago
- Bludit <= 3.9.2 - Authentication Bruteforce Mitigation Bypass☆14Updated 4 years ago
- AliGuard PHP WAF☆12Updated last year
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Updated 3 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 2 months ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 4 years ago
- A collection of tools for managing and automating vulnerability management.☆13Updated 2 years ago
- Yet another powerful payload encoder/decoder☆14Updated 2 years ago
- SSL/TLS vulnerability research☆10Updated 2 years ago
- fully automated c# reverse shells with automated ssh tunneling☆5Updated 4 years ago
- Tool useful to discover services behind unknown ports☆13Updated 3 years ago