unframework / dtmf-detectLinks
WebAudio demo to detect touch-tone DTMF codes (phone keys)
☆35Updated 8 months ago
Alternatives and similar repositories for dtmf-detect
Users that are interested in dtmf-detect are comparing it to the libraries listed below
Sorting:
- Worlds fastest steghide cracker, chewing through millions of passwords per second☆1,155Updated last year
- Steganalysis web platform☆661Updated 3 weeks ago
- Extract phone numbers from an audio recording of the dial tones.☆304Updated last year
- Yet another Stego Tool☆389Updated 2 years ago
- ☆700Updated last year
- ☆655Updated last year
- Official DeepSound repository migrated from jpinsoft.net. DeepSound is a freeware steganography tool and audio converter that hides secre…☆248Updated last year
- An extension for checking if .git is exposed in visited websites☆429Updated 2 months ago
- A python script to dump all the challenges locally of a CTFd-based Capture the Flag.☆149Updated 8 months ago
- Hash type identifier (CLI & lib)☆890Updated last week
- Some notes about Hydra for bruteforcing☆184Updated 5 years ago
- ImaginaryCTF is a platform that brings the beauty of CTF Competitions to discord, releasing a challenge every day☆43Updated 2 months ago
- A full CTF Website Server & Frontend | Extremely customizable☆59Updated last year
- Original PoC for CVE-2023-32784☆646Updated last year
- This is the updated script from https://teamrocketist.github.io/2017/08/29/Forensics-Hackit-2017-USB-ducker/☆108Updated 4 years ago
- Instructions on how to create your very own Pwnbox, originally created by HTB☆406Updated 2 years ago
- Post-exploitation tool to cover your tracks on a compromised machine (beta)☆404Updated 2 years ago
- Aggregated wordlist pulled from commonly used tools for discovery, enumeration, fuzzing, and exploitation.☆195Updated last year
- Work in progress...☆500Updated 10 months ago
- Simple steganography program based on the LSB method.☆125Updated 2 years ago
- This tool is a command line utility that allows you to convert any binary file into a QRcode movie. The data can then be reassembled visu…☆268Updated 2 years ago
- Software to identify the different types of hashes used to encrypt data and especially passwords☆610Updated last year
- A curated list of wordlists for discovery, enumeration, fuzzing, and exploitation.☆77Updated 2 months ago
- random project☆131Updated 4 years ago
- ☆212Updated 5 years ago
- Official writeups for Hack The Boo CTF 2024☆54Updated 8 months ago
- how to crack mifare 1k rfid card☆149Updated 7 years ago
- Repo of all the default wordlists included in Kali. Convienent if you're using something other than Kali.☆228Updated 3 years ago
- Search WiFi geolocation data by BSSID and SSID on different public databases.☆1,062Updated 7 months ago
- A fun repository on how to externally issue commands to Roku devices utilizing the External Control Protocol (ECP). The repository covers…☆286Updated last year