MaximeBeasse / KeyDecoder
KeyDecoder app lets you use your smartphone or tablet to decode your mechanical keys in seconds.
☆3,131Updated last year
Alternatives and similar repositories for KeyDecoder
Users that are interested in KeyDecoder are comparing it to the libraries listed below
Sorting:
- Heimdall WiFi Radar ESP8266☆567Updated 5 years ago
- OSINT from your favorite services in a friendly terminal user interface - integrations for Virustotal, Shodan, and Censys☆1,032Updated last month
- GooFuzz is a tool to perform fuzzing with an OSINT approach, managing to enumerate directories, files, subdomains or parameters without l…☆1,432Updated last year
- Wi-Fi Exploitation Framework☆2,540Updated 8 months ago
- Makes reverse engineering Android apps easier, automating repetitive tasks like pulling, decoding, rebuilding and patching an APK.☆3,455Updated last month
- A stealth AirTag clone that bypasses all of Apple's tracking protection features☆1,170Updated 3 years ago
- Tool for using wireless signals to see if you're being followed.☆636Updated 2 months ago
- The RF and reverse engineering framework for everyone. Follow and ★ to show your support!☆1,729Updated 2 weeks ago
- Scanning APK file for URIs, endpoints & secrets.☆5,272Updated last month
- OFRAK: unpack, modify, and repack binaries.☆1,944Updated this week
- Tunneling Internet traffic over Whatsapp☆2,277Updated 2 years ago
- USB Army Knife – the ultimate close access tool for penetration testers and red teamers.☆1,488Updated 3 weeks ago
- An open-source digital image forensic toolset☆2,900Updated this week
- a file-sharing tool that allows you to find the responsible person in case of a leakage☆1,055Updated 3 years ago
- 🐙 Track down GitHub users.☆903Updated 3 months ago
- 🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell …☆6,891Updated last year
- Tools and Techniques for Red Team / Penetration Testing☆6,693Updated last month
- Portable Executable reversing tool with a friendly GUI☆3,080Updated 3 weeks ago
- The Deepfake Offensive Toolkit☆4,315Updated 11 months ago
- PoC to record audio from a Bluetooth device☆1,257Updated last year
- articles☆13,154Updated 2 years ago
- 📱 Andriller - is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-de…☆1,411Updated 2 years ago
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,103Updated 6 months ago
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️☆6,081Updated last month
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.☆14,355Updated 5 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,439Updated 2 years ago
- RedEye is a visual analytic tool supporting Red & Blue Team operations☆2,711Updated last year
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,351Updated 2 months ago
- Quickly discover exposed hosts on the internet using multiple search engines.☆2,595Updated 3 weeks ago
- Network Analysis Tool☆3,234Updated 2 years ago