Collection of Scripts written to Solve/Crack Audio reCapcha Challenges
☆92Apr 11, 2015Updated 10 years ago
Alternatives and similar repositories for hack_audio_captcha
Users that are interested in hack_audio_captcha are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- Burp plugin to turn requests into curl commands☆16Apr 25, 2014Updated 11 years ago
- WinAppDbg helper script to catch API calls☆12Mar 26, 2013Updated 12 years ago
- Yet another dynamic routine hooking library for OS X. Uses Mach exception handlers.☆11Feb 7, 2016Updated 10 years ago
- Perform WiFi scans from python in OSX. Simply import this module and run wifi_scan()☆18Feb 27, 2016Updated 10 years ago
- POC of code that downloads and executes shellcode in memory.☆80May 25, 2014Updated 11 years ago
- LSE recruitment 2016 - Memory Checker☆11Jul 3, 2016Updated 9 years ago
- really ?☆12Feb 29, 2024Updated 2 years ago
- IDA Pro Plugins☆19May 31, 2015Updated 10 years ago
- Babun - a Windows shell you will love!☆10Jul 20, 2017Updated 8 years ago
- A script to reverse-engineer anti-virus signatures☆32Mar 20, 2013Updated 13 years ago
- Strictly sqlite better-queue store☆13Mar 13, 2023Updated 3 years ago
- Script to get the files list and allows to sort them by date of last modification. Store the files map and compare this map with previous…☆12Mar 4, 2018Updated 8 years ago
- ☆14Feb 19, 2021Updated 5 years ago
- Slides and demos☆48Mar 24, 2015Updated 10 years ago
- Tool to decrypt encrypted strings in AgentTesla☆16Jan 24, 2022Updated 4 years ago
- Automatically exported from code.google.com/p/reverse-engineering-scripts☆18Apr 13, 2015Updated 10 years ago
- A simple tool to help reverse engineers while dealing with obfuscated code.☆20Sep 5, 2016Updated 9 years ago
- ☆21Jul 15, 2015Updated 10 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Mar 18, 2013Updated 13 years ago
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12May 8, 2023Updated 2 years ago
- Python crawler for remote Windows shares☆12Nov 29, 2015Updated 10 years ago
- Syn flood implementation with raw sockets.☆13Nov 24, 2014Updated 11 years ago
- SSH brute forcer tool and library, using AsyncIO of Python 3.4☆36May 27, 2020Updated 5 years ago
- api-tracer is a tiny (useless) tracer☆17Feb 28, 2023Updated 3 years ago
- Advanced HTTP fingerprinting PoC☆45Mar 27, 2017Updated 8 years ago
- Symbolic execution engine for Whitespace.☆13May 30, 2021Updated 4 years ago
- A collection of custom scripts for use with Hopper disassembler☆24Feb 10, 2015Updated 11 years ago
- WooCommerce extension that adds a 'confirm email address' field to the checkout page☆13Sep 16, 2022Updated 3 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆29Sep 13, 2018Updated 7 years ago
- ☆24Jul 6, 2015Updated 10 years ago
- DEPRECATED: Simple, fast user news feeds for Django☆51Jan 2, 2019Updated 7 years ago
- An IDA Pro swiss army knife (with a sexy name!)☆56Mar 15, 2013Updated 13 years ago
- .NET Code Virtualization with cool features. Once intended to sell. Rip VirtualGuard.io☆16Feb 8, 2026Updated last month
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- Performing IoT with arduino without WiFi Module☆13Dec 17, 2017Updated 8 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆11Mar 22, 2021Updated 5 years ago
- Proof of concept prototype to perform distributed training using BVLC/caffe, based on a parameter server implementation using MPI. Data p…☆13May 7, 2015Updated 10 years ago
- Network Scanner for OpenSSL Memory Leak (CVE-2014-0160)☆11Sep 24, 2015Updated 10 years ago