solusipse / spectrologyLinks
Images to audio files with corresponding spectrograms encoder.
☆272Updated 11 months ago
Alternatives and similar repositories for spectrology
Users that are interested in spectrology are comparing it to the libraries listed below
Sorting:
- Audio file steganography. Hides files or text inside audio files and retrieve them automatically☆285Updated 2 years ago
- Funtenna P0C code demonstrated at Blackhat 2015☆90Updated 9 years ago
- BadUSB 2.0 USB-HID MiTM POC☆284Updated 9 years ago
- A fully featured backdoor that uses Twitter as a C&C server☆776Updated 4 years ago
- A collection of scripts which may come in handy during your freedom fighting activities.☆409Updated 2 years ago
- A regular-expression based python MITM DNS server with support for DNS Rebinding attacks☆570Updated 3 years ago
- SteCoSteg is OutGuess successor and Vernam cipher analog in steganography.☆56Updated 6 years ago
- Proof-of-concept of the KRACK attack against Linux and Android☆152Updated 7 years ago
- UNMAINTAINED. USE AT OWN RISK. Stegdetect is an automated tool for detecting steganographic content in images.☆412Updated 6 years ago
- ☆120Updated 6 years ago
- Some exploits and exploit development stuff.☆148Updated 3 years ago
- Mirror of Shadowbrokers release from https://steemit.com/shadowbrokers/@theshadowbrokers/lost-in-translation☆458Updated 8 years ago
- Execute a brute force attack with Steghide to file with hide information and password established☆120Updated 4 years ago
- A Software Defined Radio Attack Tool☆540Updated 6 months ago
- Various PoCs☆491Updated 5 years ago
- SSLStrip version to defeat HSTS☆318Updated 7 years ago
- An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction☆1,109Updated 3 years ago
- Fake wireless Access Point (AP) implementation using Python and Scapy, intended for convenient testing of 802.11 protocols and implementa…☆247Updated 9 years ago
- A Teensy script to open up a reverse TCP shell on Windows machines in as little time as possible.☆104Updated 8 years ago
- EternalRocks worm☆460Updated 8 years ago
- Automated Linux evil maid attack☆427Updated 9 years ago
- Detect and prevent KRACK attacks in your network☆182Updated 7 years ago
- just for fun ¯\_(ツ)_/¯☆273Updated 8 years ago
- Yet another Stego Tool☆386Updated 2 years ago
- Inaudible Voice Commands☆106Updated 3 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆493Updated 3 years ago
- A Reverse Engineering Tool for py2exe applications.☆209Updated 8 years ago
- Foremost is a console program to recover files based on their headers, footers, and internal data structures. This process is commonly re…☆327Updated 2 years ago
- Test for SSL heartbeat vulnerability (CVE-2014-0160)☆161Updated 11 years ago
- NTP Main-in-the-Middle tool☆246Updated 3 years ago