headlesszeke / zoom-virtual-foregroundLinks
Just for funsies, virtual foregrounds in Zoom conference calls
☆18Updated 5 years ago
Alternatives and similar repositories for zoom-virtual-foreground
Users that are interested in zoom-virtual-foreground are comparing it to the libraries listed below
Sorting:
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Updated 6 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 9 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 6 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- Haschcat Rules processor☆14Updated 2 years ago
- egrets monitors egress☆46Updated 5 years ago
- ☆29Updated 6 years ago
- Whitelisting LD_PRELOAD libraries using LD_AUDIT☆63Updated 4 years ago
- This is a scapy-based Python performance art piece. It creates a little magic on the internet by pretending to portscan from random netwo…☆38Updated 6 years ago
- The Multiplatform Linux Sandbox☆16Updated 2 years ago
- DFF (Digital Forensics Framework)☆11Updated 5 years ago
- ARDvark parses the Apple Remote Desktop (ARD) files to pull out application usage, user activity, and filesystem listings.☆35Updated 2 years ago
- Provides access to libhashcat☆31Updated last year
- Hostile Dropboxes Management☆26Updated 6 years ago
- Virustotal Data to Timesketch☆16Updated 6 years ago
- Files compiled from the Logica breach investigation materials☆45Updated 7 years ago
- RACF Database Parser☆11Updated last year
- Still point in moving world.☆49Updated 3 years ago
- Decryption utility for PGP Whole Disk Encryption☆20Updated 4 years ago
- backdorOS is an in-memory OS written in Python 2.7 with a built-in in-memory filesystem, hooks for open() calls and imports, Python REPL …☆72Updated 6 years ago
- Tool for red teamers to decode keys and master keys from side channel information. Released at DEF CON 28.☆32Updated 5 years ago
- A Python based backdoor that uses Steganography and a Cloud Image Service as a command and control server.☆26Updated 9 years ago
- ☆22Updated 5 years ago
- ☆16Updated last month
- A simple binary wrapper for DNS canarytokens.☆25Updated 3 years ago
- Wi-Fi Covert Channel Chat demo application☆72Updated 8 years ago
- suspect is a simple bash triage tool☆19Updated 7 years ago
- Extract, defang, resolve names and IPs from text☆23Updated 2 years ago
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Updated 4 years ago
- Jupyter Notebooks and code used for DNS MX mining to identify top email security providers☆57Updated 2 years ago