Sn0ffer - Make sound/noise/music with your network connection!
☆20Jul 1, 2016Updated 9 years ago
Alternatives and similar repositories for Sn0ffer
Users that are interested in Sn0ffer are comparing it to the libraries listed below
Sorting:
- Declare and keep up a rogue default-gateway in Cisco's HSRP default configuration☆16May 26, 2017Updated 8 years ago
- ☆14May 18, 2022Updated 3 years ago
- Yara scan Phishing Kit's Zip archive(s)☆61Jun 20, 2025Updated 9 months ago
- CLI tools using Harpoon features☆24Nov 7, 2023Updated 2 years ago
- Repository of Yara rules dedicated to Phishing Kits Zip files☆238Mar 8, 2026Updated 2 weeks ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆11Mar 2, 2021Updated 5 years ago
- certstream + analytics☆11Jan 17, 2020Updated 6 years ago
- Reaktor Ensemble(ens), Instruments(ism), Core cells(rcc), etc.☆13Jul 13, 2015Updated 10 years ago
- My logstash plugins. Filter: sig (for security detect -> IOC, sig, New value, Reference, link, frequence, ...). Output: alert created by …☆10Jul 26, 2019Updated 6 years ago
- A dataset of phishing kits in the wild☆15Jun 1, 2024Updated last year
- PwnPI, skip all the errors while installing PwnPI on your RPI3, just follow the README.☆13May 19, 2017Updated 8 years ago
- Pandora V3 Leak src☆12Dec 3, 2021Updated 4 years ago
- ☆11Nov 2, 2017Updated 8 years ago
- Client API to query the Phishing Initiative service API☆24Jan 8, 2026Updated 2 months ago
- MAIR is an open-access library of an extensive set of room impulse responses (RIRs) captured using a total of 40+ microphone techniques f…☆20Apr 14, 2019Updated 6 years ago
- code, reaktor files, max/msp files etc☆15Jan 22, 2016Updated 10 years ago
- Reaktor 6 block browser☆17Apr 26, 2017Updated 8 years ago
- ☆15Jun 7, 2021Updated 4 years ago
- ☆17May 7, 2019Updated 6 years ago
- ☆13Updated this week
- Set of tools to analyze Tinynuke samples☆15Nov 18, 2021Updated 4 years ago
- JuJuDensets / Toki MiSTer core☆16May 6, 2024Updated last year
- security in a box - tools and tactics for your digital security☆20May 4, 2015Updated 10 years ago
- a wurst+2 skid☆14Mar 9, 2022Updated 4 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆13Jun 13, 2020Updated 5 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- bad client - the sequel☆14May 7, 2022Updated 3 years ago
- documentation for the ARP-2600 at the STUDIO☆25Nov 24, 2025Updated 3 months ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Oct 13, 2020Updated 5 years ago
- Share your TTY via the browser to show people what you're up to☆18Feb 15, 2017Updated 9 years ago
- Monitor Files and Folders for Changes in Real Time .☆11Jan 10, 2019Updated 7 years ago
- ☆20Sep 24, 2024Updated last year
- Drag and drop a hosts file to convert it.☆14Jan 15, 2025Updated last year
- Bazel BSP Server☆12Apr 5, 2024Updated last year
- AliGuard PHP WAF☆12Feb 16, 2024Updated 2 years ago
- metadata indexing and searching of video containers☆17Dec 28, 2016Updated 9 years ago
- StalkPhish - The Phishing kits stalker, harvesting phishing kits for investigations.☆661Mar 11, 2024Updated 2 years ago
- Website - using Jekyll and Bootstrap☆12Updated this week
- deadsimple BSD Security Advisories and Announcements☆19Mar 12, 2026Updated last week