pimonteiro / NethovenLinks
Script that turns .pcap files into a .mid file to be played
☆15Updated 7 years ago
Alternatives and similar repositories for Nethoven
Users that are interested in Nethoven are comparing it to the libraries listed below
Sorting:
- Store arbitrary files inside PNGs to overcome nonsensical file type restrictions☆30Updated 8 years ago
- (W|H)all of lame - unencrypted password gathering under open wifi networks☆32Updated 7 years ago
- A collection of steganography tools.☆15Updated 4 years ago
- Removed according to regulations☆35Updated 7 years ago
- A collection of crackmes☆40Updated 4 months ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- Detect passive activity in the Tor-network☆13Updated 10 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 11 years ago
- A complete refactor and different take on a traditional attack script for exploiting XML-RPC pingback(s) on WordPress.☆29Updated 8 years ago
- Search your reddit saved links☆13Updated 8 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆22Updated 8 years ago
- mOrc is a post-exploitation framework for macOS written in Bash☆20Updated 2 years ago
- irc bot to scan & bruteforce ssh/telnet☆7Updated 5 years ago
- Thought experiment / prototype that performs random Google searches, clicks to increase privacy☆96Updated 8 years ago
- Scrape media right from your terminal with the help of Offliberty.☆28Updated 7 years ago
- ☆21Updated 9 years ago
- A badass grabbing tool for getting PDF's of books.☆26Updated 6 years ago
- Distributed File Storage Using JavaScript Botnets☆114Updated 11 years ago
- Hourglass cryptographically locks your files so they can only be read after a certain amount of time.☆25Updated 8 years ago
- Yet-Another-BlueTeam-Repo-YABTR. A Repo for a collection of FREE Blue team tools for both windows and Linux.. Not vendor buy to defend pr…☆2Updated 5 years ago
- Useful books, links, blogs, etc.☆14Updated 7 years ago
- Recon tool using Yatedo and Pipl☆9Updated 10 years ago
- A simple python script used to generate bit flipped versions of domain names☆23Updated 4 years ago
- a pocket-sized, teensy-based HID emulator used to exploit the targeted computer's trust of USB keyboards and mice.☆9Updated 9 years ago
- Docker container to run PoisonTap☆15Updated 8 years ago
- Scruffy. The Janitor.☆23Updated 4 months ago
- TamperMonkey/GreaseMonkey addon for Skype. Exploits headers and the Skype protocol.☆19Updated 2 years ago
- A script to generate wordlists out of wikipedia pages. Should support most of the subdomains. Some ugly code may occur☆31Updated 10 years ago
- Creating a reverse shell that works on multiple POSIX platforms☆8Updated 9 years ago
- A Quick POC To Show Why You Should Disable/Cover Your Webcam☆19Updated 8 years ago