headlesszeke / zoom-virtual-foreground
Just for funsies, virtual foregrounds in Zoom conference calls
☆18Updated 4 years ago
Alternatives and similar repositories for zoom-virtual-foreground:
Users that are interested in zoom-virtual-foreground are comparing it to the libraries listed below
- first commit☆20Updated last year
- Uninvited Guest - A file server for files over DNS TXT records☆22Updated 3 months ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 8 years ago
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago
- Here's a Perl script that can either be used as a protocol fuzzer, or a DoS tool☆24Updated 7 years ago
- ARDvark parses the Apple Remote Desktop (ARD) files to pull out application usage, user activity, and filesystem listings.☆34Updated last year
- Hostile Dropboxes Management☆25Updated 5 years ago
- THC "R U There" network discovery tool☆26Updated 4 years ago
- Zone transfers for rwhois☆20Updated 5 years ago
- Created by Jeffrey Martin via the GitHub Connector☆26Updated 10 months ago
- Eddie Vetter - triage macOS applications for security research☆16Updated 3 years ago
- Streaming Unexpected Network Byte Sequences with High Probability of Blue Screening or Otherwise Crashing Attacker Command-and-Control No…☆22Updated 5 years ago
- This is a scapy-based Python performance art piece. It creates a little magic on the internet by pretending to portscan from random netwo…☆38Updated 5 years ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Updated 5 years ago
- A small JS library to generate parametric SVG images of locks and keys, animate them and integrate onto web pages. Released as a support…☆16Updated 2 years ago
- ☆24Updated last year
- Detect & filter duplicate hashcat rules☆41Updated this week
- Extract, defang, resolve names and IPs from text☆23Updated last year
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 4 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Updated 8 years ago
- newly registered domain name/brand infringement detector☆23Updated 2 years ago
- JXA script for Mythic that prints the TCC.db☆15Updated 3 years ago
- Duo MFA auditing tool to test users' likelihood of approving unexpected push notifications☆13Updated 6 years ago
- Powershell script to find writable files on a system☆12Updated 7 years ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆11Updated 2 years ago
- Scoring Engine for CTF competitions☆46Updated last year
- Tool for red teamers to decode keys and master keys from side channel information. Released at DEF CON 28.☆29Updated 4 years ago
- A tool to catch spoofed NBNS responses.☆50Updated 6 years ago
- Scans through registry hives outputting entropy values for key/values, dumps binary contents to files...we are looking for those "fileles…☆11Updated 6 years ago