Real-Time-Voice-Cloning : Clone a voice in 5 seconds to generate arbitrary speech in real-time :
Transfer Learning from Speaker Verification to
Multispeaker Text-To-Speech Synthesis : (pdf)
Demo :
Tsurugi Linux : A heavily customized Linux distro designed for DFIR investigations, malware analysis and Open Sourced intelligence activities : cc
@Sug4r7
||
@blackmoon105
|| tsurugi_linux
Reverse Engineer's Toolkit : This is a collection of tools you may like if you are interested on reverse engineering and/or malware analysis on x86 and x64 Windows systems :
Infection Monkey : An automated pentest tool ( The Infection Monkey is an open source security tool for testing a data center's resiliency to perimeter breaches and internal server infection) :
Part 1 – Reverse Engineering Basics – Linux x64 : , Part 2 – Reverse Engineering Basics – Windows x64 : , Part 2-2 XOR encryption – Windows x64 : , Part 3 – Linux on ARM64 :
GHunt : Introducing an OSINT tool to investigate Google Accounts to find their real name, physical location, devices , their devices etc : credits
@mxchreborn
How I hacked into a Telecom Network — Part 1 (Getting the RCE) :
Part 2 : TCP Tunneling :
3 : Stealthy SSH & Dynamic Tunnels :
4 :Getting Access to CDRs, SS7 applications & VLRs:
ffsend : Easily and securely share files (up to 2GB) from the command line through a safe, private and encrypted link using a single simple command (A fully featured Firefox Send client) :
Passhunt - a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors and their 2084 default passwords : cc
@ManiarViral
hexyl : A command-line simple hex viewer for terminal (It uses a colored output to distinguish different categories of bytes (NULL bytes, printable ASCII characters, ASCII whitespace characters, other ASCII characters and non-ASCII) ) : cc
@sharkdp86
TheFatRat : an exploiting tool which compiles a malware w/ famous payload, and then the compiled maware can be executed on Linux , Windows , Mac and Android. It provides an Easy way to create Backdoors and Payload which can bypass most anti-virus :