scriptjunkie / private-record-liveLinks
Record video live to a server you control, just for fun or in case you need to collect evidence and don't want it just on your device or stored publicly.
☆42Updated 4 years ago
Alternatives and similar repositories for private-record-live
Users that are interested in private-record-live are comparing it to the libraries listed below
Sorting:
- Global key for HID iCLASS☆42Updated 8 years ago
- Tool for red teamers to decode keys and master keys from side channel information. Released at DEF CON 28.☆30Updated 4 years ago
- Tools for playing with Entrust IdentityGuard soft tokens, such as decrypting QR codes and deriving OTP secrets☆43Updated 2 years ago
- This is a scapy-based Python performance art piece. It creates a little magic on the internet by pretending to portscan from random netwo…☆38Updated 6 years ago
- Just for funsies, virtual foregrounds in Zoom conference calls☆18Updated 5 years ago
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆117Updated 6 years ago
- Formerly private repository for discussion, knowledge- and code-sharing around new Unifying vulns, as announced on Twitter☆158Updated 3 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Updated 5 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 8 years ago
- LittleSnitch Log Statistics Exporter☆33Updated 2 years ago
- A simple python script used to generate bit flipped versions of domain names☆23Updated 4 years ago
- Improved version. Based off original CopyClass Code From Meriac http://www.openpcd.org/HID_iClass_demystified☆29Updated 11 years ago
- Gets in the way of your victim's traffic and out of yours☆28Updated 5 years ago
- Volatility plugin to extract FileVault 2 VMK's☆50Updated 3 years ago
- vyos based isolation of networks☆10Updated 4 years ago
- 3D printable design to adapt Lishi 6-pin picks for use in 5-pin locks☆82Updated 10 months ago
- A Bash script which uses AWS CLI to create an image of an AWS EC2 volume☆28Updated last year
- Generates several passwords based on one single word, like a company's name.☆26Updated 3 years ago
- The Cloud Blocker☆105Updated 3 months ago
- Instagiffer creates GIFs from YouTube, HD video files, Netflix or your screen.☆20Updated 6 years ago
- ☆37Updated 3 years ago
- THC "R U There" network discovery tool☆28Updated 5 years ago
- Agent part of Hashtopus☆17Updated 7 years ago
- ☆166Updated 6 years ago
- A small JS library to generate parametric SVG images of locks and keys, animate them and integrate onto web pages. Released as a support…☆16Updated 2 years ago
- Rogue Synergy server☆18Updated 8 years ago
- This device silently hunts its prey, swooping in to gather RFID cards.☆33Updated 3 years ago
- The SSH Multiplex Backdoor Tool☆64Updated 5 years ago
- Kismapping is a WiFi heatmapping tool which consumes Kismet output and produces a heatmap. It also serves a google maps web page with the…☆55Updated 5 years ago
- Here's a Perl script that can either be used as a protocol fuzzer, or a DoS tool☆24Updated 7 years ago