spaceymonk / morse-analyzerLinks
Analyze, tweak and extract morse code from audio files.
☆12Updated 3 years ago
Alternatives and similar repositories for morse-analyzer
Users that are interested in morse-analyzer are comparing it to the libraries listed below
Sorting:
- Create a ZIPBomb for a given uncompressed size (flat and nested modes).☆102Updated 5 years ago
- Python TCP server for terminal rickrolls☆13Updated 4 years ago
- Extendable Python script handler for automating penetration testing.☆39Updated 2 years ago
- Malware written in bash to serve as an initial dropper script that will provide a strong foothold on the target device via reverse shells…☆20Updated 2 years ago
- A small binary exploitation challenge to demonstrate a typical return2libc attack☆32Updated 2 years ago
- Compress a Python script to a command-line one-liner☆77Updated 2 years ago
- CATANA - CUT your Wordlist!☆15Updated 3 years ago
- Conduct forensic investigation of suspicious domains, websites and other dangerous thing without the fear of being infected! A Live opera…☆18Updated 3 years ago
- A Python Bytecode Disassembler helping reverse engineers in dissecting Python binaries by disassembling and analyzing the compiled python…☆143Updated 2 years ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆45Updated last year
- Writeups for NoobCTF 0x1, Dark-PreCTF, Zh3ro-CTF☆19Updated 4 years ago
- 100% Undetectable NodeJS reverse shell backdoor that autoruns on startup.☆25Updated 3 years ago
- A simple Reverse Engineering challenge for starter in Reverse Engineering Attack to understand the basic concept of Reverse Engineering &…☆99Updated last year
- web application pentesting tools for docker☆17Updated 3 years ago
- Packet crafting, injection and sniffing tool☆70Updated 4 months ago
- ☆32Updated 5 months ago
- Master of Science in Cybersecurity, Sapienza University of Rome.☆55Updated last year
- Multiplatform Telegram Bot in pure PowerShell☆55Updated 3 years ago
- A semi-automatic osint/recon framework.☆25Updated last year
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆15Updated 2 years ago
- Argon2 Hash Cracker☆34Updated 2 years ago
- Network Shredder IDS☆11Updated last year
- Bifrost C2. Open-source post-exploitation using Discord API☆48Updated 4 years ago
- A simple python script to exploit vulnerable Firebase Database. If the owner of the app have set the security rules as true for both "rea…☆22Updated last year
- Hackthebox tools☆12Updated 6 years ago
- PHP lab to test captcha bypassing☆30Updated last year
- Malware and malicious applications database☆38Updated last year
- Remote Access Trojan I wrote, but didn't finish. Although, you could use this as is without many issues.☆39Updated last year
- Wireless Intrusion Detection System for Hak5's WiFi Coconut☆30Updated 2 years ago
- Dimorf is a ransomware using 256-bit AES with a self-destructing, randomly generated key for Linux OS´s☆59Updated 2 years ago