pimonteiro / NethovenLinks
Script that turns .pcap files into a .mid file to be played
☆15Updated 8 years ago
Alternatives and similar repositories for Nethoven
Users that are interested in Nethoven are comparing it to the libraries listed below
Sorting:
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆22Updated 9 years ago
- An example chrome extension to demonstrate the dangers of injecting javascript and html into a page☆35Updated 8 years ago
- Distributed File Storage Using JavaScript Botnets☆114Updated 12 years ago
- Removed according to regulations☆35Updated 8 years ago
- A collection of crackmes☆40Updated 10 months ago
- Store arbitrary files inside PNGs to overcome nonsensical file type restrictions☆30Updated 8 years ago
- Extract hashes and plain passwords from Dump Monitor tweet☆43Updated 9 years ago
- A simpe decoder to decode requests/responses made by PokemonGo in burp☆24Updated 9 years ago
- A complete refactor and different take on a traditional attack script for exploiting XML-RPC pingback(s) on WordPress.☆29Updated 8 years ago
- Let's brute force this hotel's tv.☆82Updated 6 years ago
- Grab a Twitter user timeline for further processing (storing to Elasticsearch, highligthing, etc)☆41Updated 10 years ago
- Generate users with "random-ish" realistic passwords or password hashes☆18Updated 9 years ago
- A set of Python classes that interact with and extend the Keybase.io data store of public keys☆30Updated 6 years ago
- Some NSE scripts to search information from routers☆35Updated 9 years ago
- Build a search engine from nmap XML files☆20Updated 11 years ago
- Google dorks generator to find open shells (on government sites)☆29Updated 11 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆49Updated 9 years ago
- Windows Trollware and Persistence Script☆13Updated 10 years ago
- The Hacker's Sandbox☆124Updated 6 months ago
- A badass grabbing tool for getting PDF's of books.☆26Updated 7 years ago
- Wifi-Biter is a dictionary generator used to generate dictionaries/wordlist for Wireless Router Passwords.☆14Updated 7 years ago
- Application for cracking Red Petya key based on genetic algorithms.☆56Updated 3 years ago
- (Unofficial) Python API for http://checkusernames.com☆13Updated 10 years ago
- Generate CIA/NSA style project codenames☆22Updated 8 years ago
- A web spider's worst nightmare.☆54Updated 13 years ago
- 👀 🖥️ Golang rewrite of eyes.sh. Let's you perform domain/IP address information gathering. Wasn't it esr who said "With enough eyeballs…☆53Updated 5 years ago
- Let's you perform domain/IP information gathering... in BASH! Wasn't it esr who said "With enough eyeballs, all your IP info are belong t…☆102Updated 6 years ago
- Small scripts for doing repeatable tasks☆25Updated 3 years ago
- hemingway is a simple and easy to use spear phishing helper.☆42Updated 8 years ago
- disthc☆28Updated 11 years ago