pimonteiro / NethovenLinks
Script that turns .pcap files into a .mid file to be played
☆15Updated 8 years ago
Alternatives and similar repositories for Nethoven
Users that are interested in Nethoven are comparing it to the libraries listed below
Sorting:
- Wipe files and drives securely with randoms ASCII dicks☆129Updated 6 years ago
- Store arbitrary files inside PNGs to overcome nonsensical file type restrictions☆30Updated 8 years ago
- Let's you perform domain/IP information gathering... in BASH! Wasn't it esr who said "With enough eyeballs, all your IP info are belong t…☆101Updated 6 years ago
- An example chrome extension to demonstrate the dangers of injecting javascript and html into a page☆35Updated 8 years ago
- 👀 🖥️ Golang rewrite of eyes.sh. Let's you perform domain/IP address information gathering. Wasn't it esr who said "With enough eyeballs…☆52Updated 5 years ago
- Let's brute force this hotel's tv.☆82Updated 6 years ago
- The Hacker's Sandbox☆124Updated 7 months ago
- Extract hashes and plain passwords from Dump Monitor tweet☆43Updated 9 years ago
- A reverse way of music look up by downloading full albums from online music sources☆46Updated 10 years ago
- TORBlock is a BASH script to automatically download the list of TOR exit-nodes and add them to your IPTables ruleset.☆48Updated 13 years ago
- Twitter as an extra entropy source☆104Updated 7 years ago
- A simple SSL compatible IRC bot in pure python☆14Updated 10 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Updated 8 years ago
- Thinkpad X220 board that disconnects the webcam and microphone data lines☆44Updated 6 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 11 years ago
- usbWatchdog - monitor changes to your usb ports, and if anything is plugged in or removed, wipe RAM and shut down.☆49Updated 8 years ago
- Distributed File Storage Using JavaScript Botnets☆114Updated 12 years ago
- Battalion is a tool used to automate reconnaissance and assist both pentesters and internal security/admin teams.☆43Updated 6 years ago
- A demo of altering an opened tab after a timer☆123Updated 9 years ago
- A simpe decoder to decode requests/responses made by PokemonGo in burp☆24Updated 9 years ago
- Grab a Twitter user timeline for further processing (storing to Elasticsearch, highligthing, etc)☆41Updated 10 years ago
- A collection of Hack The Planet's zines.☆72Updated 9 years ago
- A Quick POC To Show Why You Should Disable/Cover Your Webcam☆19Updated 9 years ago
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 8 years ago
- An opensource project similar to HoneyDocs☆26Updated 10 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- A simple python script used to generate bit flipped versions of domain names☆23Updated 4 years ago
- CVE-2018-20377; 20575; 20576; 20577 Multiple security vulnerabilities affecting latest firmware release on ORANGE Livebox modems.☆74Updated 2 years ago
- Reticle is a C&C network for small devices that want to be friends.☆90Updated 11 years ago
- Generate users with "random-ish" realistic passwords or password hashes☆18Updated 9 years ago