pimonteiro / NethovenLinks
Script that turns .pcap files into a .mid file to be played
☆15Updated 7 years ago
Alternatives and similar repositories for Nethoven
Users that are interested in Nethoven are comparing it to the libraries listed below
Sorting:
- A complete refactor and different take on a traditional attack script for exploiting XML-RPC pingback(s) on WordPress.☆29Updated 8 years ago
- A collection of crackmes☆40Updated 7 months ago
- An example chrome extension to demonstrate the dangers of injecting javascript and html into a page☆35Updated 8 years ago
- Let's you perform domain/IP information gathering... in BASH! Wasn't it esr who said "With enough eyeballs, all your IP info are belong t…☆100Updated 6 years ago
- Detect embedded cryptocurrency miners based on CPU usage☆20Updated 7 years ago
- Wipe files and drives securely with randoms ASCII dicks☆130Updated 5 years ago
- 👀 🖥️ Golang rewrite of eyes.sh. Let's you perform domain/IP address information gathering. Wasn't it esr who said "With enough eyeballs…☆53Updated 5 years ago
- Removed according to regulations☆35Updated 8 years ago
- Let's brute force this hotel's tv.☆82Updated 5 years ago
- Remote shell/exfiltration using keyboard leds.☆26Updated 8 years ago
- Hashcrack.org GPU-accelerated password cracker☆85Updated 9 years ago
- An attempt to document commonly believed misconceptions about Tor.☆14Updated 8 years ago
- Browser agnostic extension that enables pasting into password fields...☆15Updated 5 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 11 years ago
- Moovbox Mismanagement Utilities☆14Updated 10 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆22Updated 9 years ago
- Store arbitrary files inside PNGs to overcome nonsensical file type restrictions☆30Updated 8 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Updated 7 years ago
- Extract hashes and plain passwords from Dump Monitor tweet☆43Updated 9 years ago
- A set of local skype transforms for Maltego to utilise Skype and search the directory☆44Updated 9 years ago
- Thinkpad X220 board that disconnects the webcam and microphone data lines☆44Updated 6 years ago
- Finds abusive WiFi users using way too much traffic on public wifi and sends them a sack of hot deauth frames☆32Updated 14 years ago
- A Upnp exploitation tool.☆105Updated 5 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆49Updated 9 years ago
- (W|H)all of lame - unencrypted password gathering under open wifi networks☆32Updated 7 years ago
- disthc☆27Updated 11 years ago
- CVE-2018-20377; 20575; 20576; 20577 Multiple security vulnerabilities affecting latest firmware release on ORANGE Livebox modems.☆74Updated last year
- Resources for: "Playing games with an attacker: how I messed with someone trying to breach the CryptoWall tracker"☆24Updated 9 years ago
- Ayaabu is a funny trick that fake the installation of many Antivirus☆12Updated 9 years ago
- A badass grabbing tool for getting PDF's of books.☆26Updated 7 years ago