pimonteiro / NethovenLinks
Script that turns .pcap files into a .mid file to be played
☆15Updated 8 years ago
Alternatives and similar repositories for Nethoven
Users that are interested in Nethoven are comparing it to the libraries listed below
Sorting:
- An example chrome extension to demonstrate the dangers of injecting javascript and html into a page☆35Updated 8 years ago
- A simple python script used to generate bit flipped versions of domain names☆23Updated 4 years ago
- Battalion is a tool used to automate reconnaissance and assist both pentesters and internal security/admin teams.☆43Updated 2 weeks ago
- A simpe decoder to decode requests/responses made by PokemonGo in burp☆24Updated 9 years ago
- Store arbitrary files inside PNGs to overcome nonsensical file type restrictions☆30Updated 8 years ago
- Grab a Twitter user timeline for further processing (storing to Elasticsearch, highligthing, etc)☆41Updated 10 years ago
- Detect passive activity in the Tor-network☆13Updated 10 years ago
- An attempt to document commonly believed misconceptions about Tor.☆14Updated 8 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 11 years ago
- A complete refactor and different take on a traditional attack script for exploiting XML-RPC pingback(s) on WordPress.☆29Updated 8 years ago
- Monitoring 'DNS' inside the Tor network☆93Updated 9 years ago
- A set of Python classes that interact with and extend the Keybase.io data store of public keys☆30Updated 6 years ago
- CVE-2018-20377; 20575; 20576; 20577 Multiple security vulnerabilities affecting latest firmware release on ORANGE Livebox modems.☆75Updated 2 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆22Updated 9 years ago
- Program to search tweets, tag, hashtag, user, with locations and maps☆36Updated 10 years ago
- Removed according to regulations☆35Updated 8 years ago
- (W|H)all of lame - unencrypted password gathering under open wifi networks☆32Updated 8 years ago
- Extract useful information from a Twitter account.☆35Updated 12 years ago
- My zsh, bash and vim dot files☆68Updated 6 years ago
- A demo of altering an opened tab after a timer☆123Updated 9 years ago
- Let's you perform domain/IP information gathering... in BASH! Wasn't it esr who said "With enough eyeballs, all your IP info are belong t…☆101Updated 6 years ago
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 8 years ago
- A web spider's worst nightmare.☆54Updated 13 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Updated 8 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 10 years ago
- How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.☆153Updated 5 years ago
- An attacker-oriented library for the Teensy 3.1 microcontroller.☆44Updated 11 years ago
- A Quick POC To Show Why You Should Disable/Cover Your Webcam☆19Updated 9 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago