CGrassin / keyboard_audio_hackLinks
Python proof-of-concept for breaking passwords with a microphone, using machine learning.
☆22Updated 6 years ago
Alternatives and similar repositories for keyboard_audio_hack
Users that are interested in keyboard_audio_hack are comparing it to the libraries listed below
Sorting:
- Phoenix based exploit kit for educational purpose.☆17Updated 7 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆29Updated 2 months ago
- Reverse shell using socket programming in python☆15Updated 3 years ago
- Repository of tools used in my blog☆51Updated last year
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆13Updated 5 years ago
- A privilege escalation exploit in the Steam Client☆13Updated 6 years ago
- powershell tool for VM evasion☆42Updated 5 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Updated 5 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 3 years ago
- AES Ransomware in batch☆11Updated last year
- ransomware chiffre tous les fichiers,télécharge une image depuis un serveur distant puis change le fond d'ecran après le chiffrement des …☆25Updated 4 years ago
- recover Firefox and more browsers logins☆49Updated 4 years ago
- Fresh malware samples caught in the wild daily from random places. 🎣☆19Updated 6 years ago
- Universal LAN-based SSRF Attack Primitive☆19Updated 6 years ago
- 🔅 Reverse shell written on python3☆14Updated 5 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆18Updated 5 years ago
- python hash cracker☆52Updated last year
- A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a dec…☆33Updated 6 years ago
- Reverse Shell troll software☆12Updated 6 years ago
- Python Backdoor Obfusctor, Encrypter and Encoder☆18Updated 7 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆33Updated 6 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 5 years ago
- Sp00fer blog post -☆24Updated 3 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 6 years ago
- Modern Javascript keylogger with web panel☆23Updated 5 years ago
- Bifrost C2. Open-source post-exploitation using Discord API☆48Updated 4 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated 2 years ago
- inviteflood : SIP/SDP INVITE message flooding over UDP/IP☆12Updated 10 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits key☆31Updated 7 years ago
- Python3 script to generate Office macros for the EvilOSX framework. Author: Cedric Owens☆28Updated 5 years ago