unframework / dtmf-detectLinks
WebAudio demo to detect touch-tone DTMF codes (phone keys)
☆36Updated last year
Alternatives and similar repositories for dtmf-detect
Users that are interested in dtmf-detect are comparing it to the libraries listed below
Sorting:
- ☆722Updated last year
- ImaginaryCTF is a platform that brings the beauty of CTF Competitions to discord, releasing a challenge every day☆43Updated 8 months ago
- Official DeepSound repository migrated from jpinsoft.net. DeepSound is a freeware steganography tool and audio converter that hides secre…☆293Updated last year
- Yet another Stego Tool☆401Updated 2 years ago
- Some notes about Hydra for bruteforcing☆189Updated 5 years ago
- Steganalysis web platform☆772Updated last week
- An extension for checking if .git is exposed in visited websites☆469Updated 5 months ago
- system setup and scripts for various mitm activities☆113Updated 3 years ago
- Extract phone numbers from an audio recording of the dial tones.☆314Updated last year
- Fetch, install and search wordlist archives from websites and torrent peers.☆532Updated last year
- Latest hashcat docker for CUDA, OpenCL, and POCL. Deployed on Vast.ai☆155Updated 5 months ago
- Repo of all the default wordlists included in Kali. Convienent if you're using something other than Kali.☆244Updated 3 years ago
- A simple, very experimental TPM sniffer for LPC bus☆669Updated last year
- Perfect wordlist for discovering directories and files on target site☆312Updated 2 years ago
- A new social network for taking photos in your home town.☆75Updated 2 years ago
- Aggregated wordlist pulled from commonly used tools for discovery, enumeration, fuzzing, and exploitation.☆209Updated last year
- A tutorial on using JohnTheRipper and Hashcat to crack lost keepass passwords☆78Updated 4 years ago
- Various wordlists FR & EN - Cracking French passwords☆310Updated this week
- Minimalist Asterisk Caller ID Spoofer and Secondary VOIP Line Configuration Built for AWS☆311Updated 5 years ago
- Tryhackme rooms & tools☆64Updated 5 years ago
- A curated list of wordlists for discovery, enumeration, fuzzing, and exploitation.☆92Updated 8 months ago
- A python script to dump all the challenges locally of a CTFd-based Capture the Flag.☆163Updated last year
- Instructions on how to create your very own Pwnbox, originally created by HTB☆421Updated 3 years ago
- Recovers pixelized text from images☆235Updated 4 years ago
- brute-forcing su for fun and possibly profit☆99Updated 6 years ago
- 🍳 The most delicious pentesting tool☆45Updated 4 years ago
- Some of the best web shells that you might need!☆348Updated 2 years ago
- Yet another tool to dump a git repository from a website, focused on as-complete-as-possible dumps and handling weird edge-cases.☆637Updated 9 months ago
- DSJAS: Dave Smith Johnson & son. A fake bank for baiting scammers attempting to steal from online banking.☆87Updated 5 months ago
- Rule for hashcat or john. Aiming to crack how people generate their password☆459Updated last year