headlesszeke / zoom-virtual-foregroundLinks
Just for funsies, virtual foregrounds in Zoom conference calls
☆18Updated 5 years ago
Alternatives and similar repositories for zoom-virtual-foreground
Users that are interested in zoom-virtual-foreground are comparing it to the libraries listed below
Sorting:
- The SSH Multiplex Backdoor Tool☆65Updated 6 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 9 years ago
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Updated 5 years ago
- This is a scapy-based Python performance art piece. It creates a little magic on the internet by pretending to portscan from random netwo…☆38Updated 6 years ago
- Haschcat Rules processor☆14Updated 2 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supp…☆59Updated 3 years ago
- Tool for red teamers to decode keys and master keys from side channel information. Released at DEF CON 28.☆32Updated 5 years ago
- ARDvark parses the Apple Remote Desktop (ARD) files to pull out application usage, user activity, and filesystem listings.☆35Updated 2 years ago
- Provides access to libhashcat☆31Updated last year
- LittleSnitch Log Statistics Exporter☆35Updated 2 years ago
- Creates dictionaries based on Wikipedia titles☆61Updated 6 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- List (or plunder) private repos/gists to which a token has access, including those of other users☆11Updated 3 years ago
- ☆28Updated 6 years ago
- Automated password cracking with AWS GPU instances and CUDA hashcat☆51Updated 10 years ago
- first commit☆20Updated last month
- ☆16Updated 6 months ago
- Hostile Dropboxes Management☆26Updated 5 years ago
- Rogue Synergy server☆18Updated 8 years ago
- Jupyter Notebooks and code used for DNS MX mining to identify top email security providers☆56Updated 2 years ago
- DFF (Digital Forensics Framework)☆11Updated 4 years ago
- PoC's and Slides from 'Gophers, whales and.. clouds? Oh my!' BSides Wellington presentation by Glenn 'devalias' Grant☆16Updated 7 years ago
- A small JS library to generate parametric SVG images of locks and keys, animate them and integrate onto web pages. Released as a support…☆17Updated 3 years ago
- Use Markov Chains to obfuscate data as other data☆55Updated 9 years ago
- Still point in moving world.☆49Updated 3 years ago
- egrets monitors egress☆46Updated 5 years ago
- Reference implementation and job creation tool for cracking DES using the crack.sh service☆22Updated 8 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Updated 6 years ago
- ☆30Updated 5 years ago