pimonteiro / Nethoven
Script that turns .pcap files into a .mid file to be played
☆15Updated 7 years ago
Alternatives and similar repositories for Nethoven:
Users that are interested in Nethoven are comparing it to the libraries listed below
- An example chrome extension to demonstrate the dangers of injecting javascript and html into a page☆35Updated 7 years ago
- Store arbitrary files inside PNGs to overcome nonsensical file type restrictions☆30Updated 7 years ago
- zsh plugin for metasploit framework☆14Updated 7 years ago
- A Discord bot to enable friendship (and at times enforce it)☆14Updated 5 years ago
- A collection of crackmes☆40Updated 3 months ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 10 years ago
- A set of Python classes that interact with and extend the Keybase.io data store of public keys☆29Updated 5 years ago
- A collection of steganography tools.☆15Updated 4 years ago
- Removed according to regulations☆35Updated 7 years ago
- Wipe files and drives securely with randoms ASCII dicks☆129Updated 5 years ago
- Battalion is a tool used to automate reconnaissance and assist both pentesters and internal security/admin teams.☆44Updated 5 years ago
- Grab a Twitter user timeline for further processing (storing to Elasticsearch, highligthing, etc)☆41Updated 9 years ago
- Anti-Honeypot Demo (obsolete)☆18Updated 7 years ago
- Windows Trollware and Persistence Script☆12Updated 9 years ago
- Extract useful information from a Twitter account.☆34Updated 11 years ago
- Browser agnostic extension that enables pasting into password fields...☆15Updated 5 years ago
- An attempt to document commonly believed misconceptions about Tor.☆14Updated 7 years ago
- A self-hosted drag-and-drop, nosql yet fully-featured file-scanning server.☆30Updated 3 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Updated 7 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- Extracting information from phone numbers☆5Updated 8 years ago
- Recon tool using Yatedo and Pipl☆9Updated 10 years ago
- WaitList.dat Parser☆26Updated 6 years ago
- The Seesaw pipeline grab script for the URLTeam (terroroftinytown) project☆27Updated 8 months ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- A simple Tor enabled, multi-process SSH dictionary attack in Python3.☆18Updated 7 years ago
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 8 years ago
- (W|H)all of lame - unencrypted password gathering under open wifi networks☆32Updated 7 years ago
- Some NSE scripts to search information from routers☆36Updated 9 years ago
- An IRC bot who execute shodan queries☆9Updated 10 years ago