spaceymonk / morse-analyzer
Analyze, tweak and extract morse code from audio files.
☆12Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for morse-analyzer
- Gain A Meterpreter Shell With A BadUSB Attack In Less Than 5 Seconds.☆16Updated 2 years ago
- Maltego transform with Keskivonfer☆14Updated 4 years ago
- A Python script to hack parrot drones automatically. It allows to spawn a shell on the drone to control it.☆12Updated 5 years ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆37Updated 2 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- ViperVenom is an open-source cyber offensive tool developed by Itay Funes for pentesters. ViperVenom is a great tool when it comes to pen…☆14Updated 2 years ago
- Chromiux is a python based console app that extracts the encrypted saved passwords/cookies in txt format of chrome browser.☆18Updated 3 years ago
- Conduct forensic investigation of suspicious domains, websites and other dangerous thing without the fear of being infected! A Live opera…☆18Updated 2 years ago
- Script hack Facebook mbf v2☆10Updated 3 years ago
- Spring cloud gateway code injection : CVE-2022-22947☆10Updated 2 years ago
- Personal blog about cyber security and challenges☆17Updated 7 months ago
- ResetRyder - Open Source Brute Force Password Reset Tool☆15Updated last month
- An End to End Encrypted SMS and SMS Tunneling app☆41Updated last year
- Inject Metasploit Shell Code in Legitimate Process☆11Updated 3 years ago
- Darkside Ransomware☆12Updated 3 years ago
- A proof-of-concept Node.js ransomware☆20Updated 2 years ago
- recover Firefox and more browsers logins☆47Updated 2 years ago
- Network/host scanner and information gatherer☆25Updated last year
- Payloads and Lists☆20Updated 4 years ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆15Updated 5 years ago
- Static and Dynamic Analysis of Malware Samples☆11Updated 4 years ago
- SSH Honeypot that gathers creds and attempted commands☆19Updated 3 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 2 years ago
- A python network scanner using scapy☆20Updated 4 years ago
- Manage and access your Kali Linux or Parrot Security VM from the terminal (SSH support + file sharing, especially convenient during CTFs,…☆20Updated 3 months ago
- VNCBruteForce - Brute Force attacks VNC with Hydra.☆21Updated 3 years ago
- Writeups for NoobCTF 0x1, Dark-PreCTF, Zh3ro-CTF☆15Updated 3 years ago