Collection of Scripts written to Solve/Crack Audio reCapcha Challenges
☆92Apr 11, 2015Updated 10 years ago
Alternatives and similar repositories for hack_audio_captcha
Users that are interested in hack_audio_captcha are comparing it to the libraries listed below
Sorting:
- Yet another dynamic routine hooking library for OS X. Uses Mach exception handlers.☆11Feb 7, 2016Updated 10 years ago
- LSE recruitment 2016 - Memory Checker☆11Jul 3, 2016Updated 9 years ago
- WinAppDbg helper script to catch API calls☆12Mar 26, 2013Updated 12 years ago
- Burp plugin to turn requests into curl commands☆16Apr 25, 2014Updated 11 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- Flow control tracer/debugger for OSX; provides a complete trace of all instructions executed by a process. Perfect if you want to know e…☆20Jul 4, 2012Updated 13 years ago
- IDA Pro Plugins☆19May 31, 2015Updated 10 years ago
- _Working_ examples from Grayhat Python☆14Apr 28, 2015Updated 10 years ago
- Syn flood implementation with raw sockets.☆13Nov 24, 2014Updated 11 years ago
- Automatically exported from code.google.com/p/reverse-engineering-scripts☆18Apr 13, 2015Updated 10 years ago
- ☆20Nov 22, 2016Updated 9 years ago
- ☆21Jul 15, 2015Updated 10 years ago
- Perform WiFi scans from python in OSX. Simply import this module and run wifi_scan()☆18Feb 27, 2016Updated 10 years ago
- Slides and demos☆48Mar 24, 2015Updated 10 years ago
- POC of code that downloads and executes shellcode in memory.☆80May 25, 2014Updated 11 years ago
- A collection of custom scripts for use with Hopper disassembler☆24Feb 10, 2015Updated 11 years ago
- A simple tool to help reverse engineers while dealing with obfuscated code.☆20Sep 5, 2016Updated 9 years ago
- Date of Concorde In January of the year 1976 after 29 years of the first to penetrate to the speed of sound military aircraft jet - Two C…☆10Feb 11, 2017Updated 9 years ago
- ☆24Jul 6, 2015Updated 10 years ago
- Hardware keylogger dongle with built-in Wi-Fi for live keystroke capture/injection and other fun stuff☆21May 13, 2016Updated 9 years ago
- Tool to analyze iOS crash reports☆29Jan 12, 2014Updated 12 years ago
- A script to reverse-engineer anti-virus signatures☆32Mar 20, 2013Updated 12 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Mar 18, 2013Updated 12 years ago
- Parses Nmap XML files☆25Apr 29, 2015Updated 10 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆29Sep 13, 2018Updated 7 years ago
- Advanced HTTP fingerprinting PoC☆45Mar 27, 2017Updated 8 years ago
- SSH brute forcer tool and library, using AsyncIO of Python 3.4☆36May 27, 2020Updated 5 years ago
- NrvrCommander is a Python package for devops and QA automation around virtual machines, VMware, Linux, and more.☆16Dec 8, 2015Updated 10 years ago
- Tools, documentation and test inputs for fuzzing opensource projects with AddressSanitizer and friends.☆29Sep 24, 2015Updated 10 years ago
- Just a collection of scripts☆40Apr 15, 2020Updated 5 years ago
- Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis☆65Sep 15, 2015Updated 10 years ago
- Automatically performs the SMB relay attack☆73May 13, 2016Updated 9 years ago
- View tables, check queries and see entity descriptions for a SQLite3 database☆10Oct 15, 2014Updated 11 years ago
- WHICH ARE THE BEST SMARTPHONES UNDER 15000 . Best Smartphones under Rs.15000 models 2021 Step by step instructions to track down the bes…☆13Sep 6, 2021Updated 4 years ago
- Airports information per language☆14Oct 17, 2015Updated 10 years ago
- An instrumentation script based on Frida which leverages Control Flow Guard to intercept indirect calls in CFG-enabled Windows binaries.☆30Jun 24, 2015Updated 10 years ago
- AT&T Samsung Galaxy S II (SGH-I777) Linux kernel source☆18Mar 11, 2012Updated 13 years ago
- Provides the ability to patch/hook functions imported by a dll or executable☆35May 31, 2010Updated 15 years ago
- An x86 linux syscall table reference tool. Handy for when writing shellcode and exploits.☆35May 7, 2015Updated 10 years ago