Skip to content
#

hacking

Here are 777 public repositories matching this topic...

This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.

  • Updated Aug 27, 2020
  • Python
urh
BSAsecure
BSAsecure commented Feb 12, 2020
Expected Behavior

Better control over GAIN for LimeSDR device (not mini).
Please use example of the SDR Console Gain Control.

Actual Behavior

Signal really weak on the low frequencies even if GAIN is maximized.

Steps To Reproduce
  1. Go to URH
  2. Click on Spectrum Analyzer
  3. Refresh device, select sampling rate to 2.5M and Gain to above middle point (also tested maxim
jofpin
jofpin commented Jan 22, 2020

It has been a pleasure for me to contribute to all of you 2 versions of this tool.

I've been working on other open source projects that I'm about to release for you, so I haven't finished trape version 3.0.

But, I invite you and the entire community that has used this project, to collaborate with some lines of code, implementing your own ideas and improving trape, turning it into a project o

Ciphey
TheAlcanian
TheAlcanian commented Jul 29, 2020

Describe the bug
When running Ciphey on a base64-encoded file using the - command-line parameter, Ciphey picks up and decodes the base64-encoded file's contents, and prints the decoded content like normal. When running Ciphey on a base64-encoded file using the -i command-line parameter, Ciphey finds no results.

To Reproduce
Steps to reproduce the behavior:

  1. What input did you u
Tool-X

Tool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other Linux based systems. using Tool-X you can install almost 370+ hacking tools in termux app and other linux based distributions.

  • Updated Aug 26, 2020
  • Python

A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.

  • Updated Jul 6, 2020
  • Python

CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection

  • Updated Aug 26, 2020
  • Python

Improve this page

Add a description, image, and links to the hacking topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the hacking topic, visit your repo's landing page and select "manage topics."

Learn more

You can’t perform that action at this time.