Python proof-of-concept for breaking passwords with a microphone, using machine learning.
☆22Dec 29, 2019Updated 6 years ago
Alternatives and similar repositories for keyboard_audio_hack
Users that are interested in keyboard_audio_hack are comparing it to the libraries listed below
Sorting:
- 🎥 Brickcom Private Security Cam's Scan and Exploit Improper view DataBase 📺 Watching priv8 (records 📼) in real time from almost countr…☆20Jan 16, 2019Updated 7 years ago
- AES Ransomware in batch☆11Jun 25, 2024Updated last year
- Exploits for TRENDNet routers☆13Apr 21, 2020Updated 5 years ago
- Get latest Exploit Databases notification on your Desktop☆16Jan 29, 2020Updated 6 years ago
- A privilege escalation exploit in the Steam Client☆13Aug 11, 2019Updated 6 years ago
- Fastly scans open ports on large networks and bruteforce login mechanism of found services☆12Aug 24, 2019Updated 6 years ago
- A lookup tool created to explore the NJ Arrest file from the FBI. Created for Hack Jersey 2.0☆14Apr 1, 2015Updated 10 years ago
- Vulnerable Bank Web Application for Cyber Security Course☆13Dec 11, 2022Updated 3 years ago
- A tool to speed up Android pentesting by automating the APK acquisition and information gathering☆18Jul 6, 2022Updated 3 years ago
- little scripts created during my time as a pentetration tester☆31Jun 17, 2012Updated 13 years ago
- A simple python script that spams a message on WhatsApp☆31Aug 15, 2022Updated 3 years ago
- Text messages (SMS) for two-factor authentication, generating all possible/likely codes☆15Aug 4, 2019Updated 6 years ago
- 📝 Instagram Info Scraper☆14Mar 3, 2021Updated 4 years ago
- Universal LAN-based SSRF Attack Primitive☆19Aug 10, 2019Updated 6 years ago
- Subdomain Scan With Ping Method.☆46Dec 12, 2020Updated 5 years ago
- ☆17Mar 21, 2019Updated 6 years ago
- Brute force tool for telnet and ssh, programmed in python (with Zmap)☆13Jul 3, 2019Updated 6 years ago
- This is a large list of ransomware decryptor from various link. Consist from various type of ransomware. Feel free to contribute.☆17Mar 3, 2017Updated 8 years ago
- A library to encrypt / decrypt with AES (Rijndael) between C# Net Core and JavaScript and securely hash with Scrypt☆20Dec 8, 2022Updated 3 years ago
- Cisco IOS Exploit Framework☆22Dec 21, 2019Updated 6 years ago
- Ubuntu stealer, steal ubuntu information in local pc☆21Jan 16, 2020Updated 6 years ago
- Python Remote Administration Tool With GUI☆18Jun 6, 2023Updated 2 years ago
- Espia trafico de la red NETSPY.sh ( hackingyseguridad.com )☆23Apr 27, 2025Updated 10 months ago
- Open-source Exploiting Framework☆31Mar 13, 2017Updated 8 years ago
- Probe_Spider is a Open Source Intelligence Tool made complete out of Python.☆27Apr 28, 2020Updated 5 years ago
- Android Hacking Framework to generate apk with backdoor, Works on both WAN and LAN☆19Jun 19, 2022Updated 3 years ago
- This Tool For Bangladesh FB IDz Cloning or Hacking☆25Sep 26, 2022Updated 3 years ago
- Ospy is a penetration testing tool for macOS, include keylogger, live screen catcher, reveres shell and more. Developed in c☆24May 18, 2019Updated 6 years ago
- Create Evil Twin network that deauthernticates victims to force them to connect to your evil AP.☆27May 21, 2021Updated 4 years ago
- Tool for sniffing Recent activity as well as payload of SMS and future types of communications on Android devices.☆31Jan 12, 2014Updated 12 years ago
- Airdrop Crazy☆57May 15, 2020Updated 5 years ago
- ☆12May 13, 2020Updated 5 years ago
- ☆16Jul 28, 2020Updated 5 years ago
- Perl IRC Bot for scanning and exploiting VNC servers on several ports using Mojo::IRC module.☆12Oct 27, 2021Updated 4 years ago
- DirScan是一款探测网站路径存活的工具,扫描批量网站的路径(目录或文件或Api),快速发现薄弱点☆28Feb 17, 2020Updated 6 years ago
- A defense tool - detect web shells in local directories via md5sum☆32Jul 18, 2019Updated 6 years ago
- Simple RAT in C#☆27Apr 11, 2020Updated 5 years ago
- Metasploit-like pentest framework derived from TIDoS (https://github.com/0xInfection/TIDoS-Framework)☆65Dec 16, 2020Updated 5 years ago
- Wireless pentesting tool with functionalities such as password cracking (in WEP and WPA/WPA2 networks), DoS attacks, client de-authentica…☆31Sep 30, 2019Updated 6 years ago