pimonteiro / Nethoven
Script that turns .pcap files into a .mid file to be played
☆15Updated 7 years ago
Alternatives and similar repositories for Nethoven:
Users that are interested in Nethoven are comparing it to the libraries listed below
- Store arbitrary files inside PNGs to overcome nonsensical file type restrictions☆30Updated 7 years ago
- irc bot to scan & bruteforce ssh/telnet☆7Updated 5 years ago
- An example chrome extension to demonstrate the dangers of injecting javascript and html into a page☆35Updated 7 years ago
- A simpe decoder to decode requests/responses made by PokemonGo in burp☆24Updated 8 years ago
- zsh plugin for metasploit framework☆14Updated 7 years ago
- Moovbox Mismanagement Utilities☆14Updated 9 years ago
- NSA headline generator☆32Updated 10 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆21Updated 8 years ago
- Browser agnostic extension that enables pasting into password fields...☆15Updated 5 years ago
- A python reddit bot for responding to mentions or comments with a markov chain sentence.☆9Updated 3 years ago
- Just for some security tools I am making since HomeBrew doesn't like non-popular tools☆9Updated 4 years ago
- ArchAssault PKGBUILDs☆44Updated 9 years ago
- Hourglass cryptographically locks your files so they can only be read after a certain amount of time.☆25Updated 8 years ago
- Basic Taser☆34Updated 4 years ago
- Domain cralwer for various sites/databases☆9Updated 6 years ago
- Removed according to regulations☆35Updated 7 years ago
- An attempt to document commonly believed misconceptions about Tor.☆14Updated 7 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 5 years ago
- The textpunk NNTPchan client☆28Updated 7 years ago
- Yet-Another-BlueTeam-Repo-YABTR. A Repo for a collection of FREE Blue team tools for both windows and Linux.. Not vendor buy to defend pr…☆2Updated 5 years ago
- A collection of crackmes☆40Updated last week
- Modification and tools for using hostapd for rogue AP attacks impersonating WPA-Enterprise networks to steal user credentials☆40Updated 6 years ago
- A Quick POC To Show Why You Should Disable/Cover Your Webcam☆19Updated 8 years ago
- A fully automated Tumblr archiver written in Python (work-in-progress)☆13Updated 9 years ago
- An attacker-oriented library for the Teensy 3.1 microcontroller.☆43Updated 10 years ago
- A collection of steganography tools.☆15Updated 4 years ago
- Multiple-monitor friendly Screensaver that rotates through random open webcams, all over the world.☆22Updated 8 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Updated 7 years ago
- Battalion is a tool used to automate reconnaissance and assist both pentesters and internal security/admin teams.☆44Updated 5 years ago
- Monitor a reddit live feed from the command line☆16Updated last year