pimonteiro / NethovenLinks
Script that turns .pcap files into a .mid file to be played
☆15Updated 7 years ago
Alternatives and similar repositories for Nethoven
Users that are interested in Nethoven are comparing it to the libraries listed below
Sorting:
- A complete refactor and different take on a traditional attack script for exploiting XML-RPC pingback(s) on WordPress.☆29Updated 8 years ago
- An example chrome extension to demonstrate the dangers of injecting javascript and html into a page☆35Updated 8 years ago
- A collection of crackmes☆40Updated 8 months ago
- A simpe decoder to decode requests/responses made by PokemonGo in burp☆24Updated 9 years ago
- Store arbitrary files inside PNGs to overcome nonsensical file type restrictions☆30Updated 8 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆22Updated 9 years ago
- Moovbox Mismanagement Utilities☆14Updated 10 years ago
- Removed according to regulations☆35Updated 8 years ago
- Program to search tweets, tag, hashtag, user, with locations and maps☆37Updated 9 years ago
- An attempt to document commonly believed misconceptions about Tor.☆14Updated 8 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 11 years ago
- Detect passive activity in the Tor-network☆13Updated 10 years ago
- Battalion is a tool used to automate reconnaissance and assist both pentesters and internal security/admin teams.☆43Updated 6 years ago
- Wipe files and drives securely with randoms ASCII dicks☆132Updated 5 years ago
- Grab a Twitter user timeline for further processing (storing to Elasticsearch, highligthing, etc)☆41Updated 10 years ago
- 👀 🖥️ Golang rewrite of eyes.sh. Let's you perform domain/IP address information gathering. Wasn't it esr who said "With enough eyeballs…☆53Updated 5 years ago
- A simple python script used to generate bit flipped versions of domain names☆23Updated 4 years ago
- A demo of altering an opened tab after a timer☆122Updated 9 years ago
- An attacker-oriented library for the Teensy 3.1 microcontroller.☆44Updated 10 years ago
- Browser agnostic extension that enables pasting into password fields...☆15Updated 5 years ago
- Extract hashes and plain passwords from Dump Monitor tweet☆43Updated 9 years ago
- Agent part of Hashtopus☆17Updated 8 years ago
- A collection of steganography tools.☆15Updated 4 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- LIFARS Networking Security GNU/Linux distro☆27Updated 7 years ago
- The Hacker's Sandbox☆123Updated 5 months ago
- Windows Trollware and Persistence Script☆13Updated 10 years ago
- Anti-Anti-Automation Framework☆99Updated 11 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆49Updated 9 years ago
- Detect embedded cryptocurrency miners based on CPU usage☆20Updated 7 years ago