headlesszeke / zoom-virtual-foregroundLinks
Just for funsies, virtual foregrounds in Zoom conference calls
☆18Updated 5 years ago
Alternatives and similar repositories for zoom-virtual-foreground
Users that are interested in zoom-virtual-foreground are comparing it to the libraries listed below
Sorting:
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Updated 5 years ago
- singe's grep - a fast grep using single-file parallelism☆47Updated 2 years ago
- Fuzz Network Traffic☆18Updated 6 months ago
- Zone transfers for rwhois☆20Updated 6 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 8 years ago
- Hostile Dropboxes Management☆26Updated 5 years ago
- Uninvited Guest - A file server for files over DNS TXT records☆22Updated 9 months ago
- The Cloud Blocker☆106Updated 4 months ago
- ☆26Updated last year
- Still point in moving world.☆51Updated 2 years ago
- first commit☆20Updated last year
- ARDvark parses the Apple Remote Desktop (ARD) files to pull out application usage, user activity, and filesystem listings.☆35Updated 2 years ago
- suspect is a simple bash triage tool☆18Updated 6 years ago
- An experiment to address digital intelligence archiving on offensive engagements.☆25Updated 4 years ago
- ☆28Updated 5 years ago
- This is a scapy-based Python performance art piece. It creates a little magic on the internet by pretending to portscan from random netwo…☆38Updated 6 years ago
- Silly proof-of-concept for a PDF chatroom☆21Updated 2 years ago
- The Multiplatform Linux Sandbox☆16Updated last year
- THC "R U There" network discovery tool☆28Updated 5 years ago
- Virustotal Data to Timesketch☆17Updated 6 years ago
- Notebook collection☆10Updated 6 years ago
- Automated password cracking with AWS GPU instances and CUDA hashcat☆51Updated 10 years ago
- wordlists for password cracking☆28Updated 2 years ago
- A Python based backdoor that uses Steganography and a Cloud Image Service as a command and control server.☆26Updated 8 years ago
- A simple binary wrapper for DNS canarytokens.☆25Updated 2 years ago
- DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supp…☆58Updated 3 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆42Updated 3 years ago
- Haschcat Rules processor☆14Updated 2 years ago
- DFF (Digital Forensics Framework)☆10Updated 4 years ago