CGrassin / keyboard_audio_hackLinks
Python proof-of-concept for breaking passwords with a microphone, using machine learning.
☆22Updated 5 years ago
Alternatives and similar repositories for keyboard_audio_hack
Users that are interested in keyboard_audio_hack are comparing it to the libraries listed below
Sorting:
- Phoenix based exploit kit for educational purpose.☆17Updated 7 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆25Updated 3 years ago
- Sp00fer blog post -☆24Updated 3 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆18Updated 5 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Updated 5 years ago
- ☆23Updated 6 years ago
- powershell tool for VM evasion☆42Updated 5 years ago
- Undetectable Windows Payload Generation☆10Updated 8 years ago
- Repository of tools used in my blog☆51Updated last year
- Windows Crypter/Decrypter Generator with AES 256 bits key☆30Updated 7 years ago
- A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a dec…☆33Updated 6 years ago
- psgen is a powershell payload generator tool for hacking. It can be used to generate, minify, and encode the powershell payload (e.g., re…☆18Updated 5 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆28Updated 3 weeks ago
- A privilege escalation exploit in the Steam Client☆13Updated 6 years ago
- Obfuscates a Python Script and the accompanying Shellcode.☆57Updated 5 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Updated 5 years ago
- Basic tool to automate backdooring PE files☆55Updated 3 years ago
- Shock the shell! Exploit many injection method for shellshock☆18Updated 7 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆29Updated 3 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Updated 5 years ago
- Reverse shell using Windows Registry files (.reg)☆17Updated 5 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 6 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆23Updated 3 years ago
- Reverse Shell troll software☆12Updated 6 years ago
- The Python Password-Protected Obfuscator☆33Updated 6 years ago
- MSFVenom Powershell Stager Encoder & Generator☆16Updated 4 years ago
- Apache Tomcat Manager API WAR Shell Upload☆33Updated 5 years ago
- 🔅 Reverse shell written on python3☆14Updated 5 years ago
- Bypass Windows Defender with py2exe from memory.☆39Updated 3 years ago
- python hash cracker☆52Updated last year