Extract phone numbers from an audio recording of the dial tones.
☆317May 17, 2024Updated last year
Alternatives and similar repositories for dtmf-decoder
Users that are interested in dtmf-decoder are comparing it to the libraries listed below
Sorting:
- Virtual machine configuration for CTF☆38Mar 28, 2021Updated 4 years ago
- Tool to hide data in MP3files☆65Jan 21, 2026Updated last month
- Telegram bot for downloading covid-19 vaccine certificate☆30Sep 24, 2021Updated 4 years ago
- Sqlmap 盲注日志 Payload 分析转明文脚本☆18Dec 15, 2020Updated 5 years ago
- SSTV Decoder☆261Nov 4, 2019Updated 6 years ago
- detect stegano-hidden data in PNG & BMP☆1,539Jan 28, 2026Updated last month
- Dynamically generate images for open-graph or website☆28Feb 29, 2024Updated 2 years ago
- An advanced monkeypatcher add-on for Pyrogram. Docs : https://rahulps1000.gitbook.io/pyropatch☆34Dec 12, 2024Updated last year
- RSA attack tool (mainly for ctf) - retrieve private key from weak public key and/or uncipher data☆6,800Feb 23, 2026Updated last week
- Yet another Stego Tool☆401Jul 3, 2023Updated 2 years ago
- PyGlimmer是一款专为PyInstaller打包应用程序分析而设计的综合性Python逆向工程集成工具☆44Oct 16, 2025Updated 4 months ago
- CRC32 tools: reverse, undo/rewind, and calculate hashes☆378Sep 21, 2024Updated last year
- A Sublime Text 2 Plugin that can generate a sequence of numbers using search and replace.☆28Sep 29, 2019Updated 6 years ago
- A steganography tool for embedding payloads within Python bytecode.☆154Dec 2, 2019Updated 6 years ago
- a simple chat server for the esp8266.☆10May 19, 2021Updated 4 years ago
- Literally does the opposite of Ciphey. Encrypts text.☆11Feb 25, 2021Updated 5 years ago
- These are the write up of b3f0re and offical to study☆22Dec 13, 2022Updated 3 years ago
- A GitHub Action hosted Python IDE!☆22Mar 25, 2022Updated 3 years ago
- Evil maid attacks are the biggest threat to full disk encryption, if you can't provide 100% physical security. It's not about locking you…☆11Sep 4, 2016Updated 9 years ago
- Binary Ninja Plugin for RISC-V☆14Nov 29, 2023Updated 2 years ago
- ☆16Apr 24, 2023Updated 2 years ago
- Wifi Marauder for the 2.8'' ESP32 Module ESP32-2432S028R WiFi+BT Dual-core 240X320 Smart Display. Better know as the CYD.☆12Jun 6, 2024Updated last year
- Lost and Found: Stopping Bluetooth Finders from Leaking Private Information☆14Apr 22, 2022Updated 3 years ago
- Challenges for the GRCon 2022 CTF☆10Oct 5, 2022Updated 3 years ago
- Tomcat PUT方法任意文件写入(CVE-2017-12615)exp☆11Mar 14, 2023Updated 2 years ago
- ☆11Jan 1, 2025Updated last year
- Compiled executables of common crypto and encoding algorithms☆16Oct 3, 2023Updated 2 years ago
- PCRT (PNG Check & Repair Tool), a tool to help check and fix the error in a PNG image.☆256Aug 30, 2022Updated 3 years ago
- ☆25Dec 8, 2020Updated 5 years ago
- QR login for pyrogram client☆25Sep 8, 2022Updated 3 years ago
- USB键盘流量包取证工具 , 用于恢复用户的击键信息☆377Feb 11, 2026Updated 3 weeks ago
- An advanced Bluetooth scanner for the ESP32 CYD device that monitors nearby Bluetooth devices and alerts you when new devices come within…☆17Sep 22, 2024Updated last year
- 1090ES ADS-B Out Add-on☆13Sep 15, 2019Updated 6 years ago
- OSINT Platform - Provides image analysis, digital footprints, video transcription and more. Retrieval Augmented Generation (RAG) capable …☆11Jun 25, 2024Updated last year
- Communicate from ring-0 to ring-3 using NamedPipes.☆10Feb 22, 2023Updated 3 years ago
- Telegram bot to trim and download videos from youtube.☆60Apr 24, 2022Updated 3 years ago
- NFC MiTM made with two PN532 readers and a Raspberry Pi.☆33Jan 20, 2026Updated last month
- ☆32Jun 13, 2023Updated 2 years ago
- Least Significant Bit Steganography for bitmap images (.bmp and .png), WAV sound files, and byte sequences. Simple LSB Steganalysis (LSB …☆646Oct 10, 2025Updated 4 months ago