KeyDecoder app lets you use your smartphone or tablet to decode your mechanical keys in seconds.
β3,172Feb 4, 2024Updated 2 years ago
Alternatives and similar repositories for KeyDecoder
Users that are interested in KeyDecoder are comparing it to the libraries listed below
Sorting:
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password π‘οΈβ6,415Dec 20, 2025Updated 2 months ago
- π΅οΈββοΈ Offensive Google framework.β18,465Feb 5, 2026Updated 3 weeks ago
- Tools and Techniques for Red Team / Penetration Testingβ8,516Mar 18, 2025Updated 11 months ago
- Never ever ever use pixelation as a redaction techniqueβ8,220Mar 15, 2024Updated last year
- RedEye is a visual analytic tool supporting Red & Blue Team operationsβ2,738Oct 20, 2023Updated 2 years ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory toolsβ2,155Updated this week
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRsβ1,230Aug 18, 2023Updated 2 years ago
- π A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.β52,699Feb 13, 2026Updated 2 weeks ago
- π€β¨οΈ Acoustic keyboard eavesdroppingβ8,970Jan 15, 2023Updated 3 years ago
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sockβ7,111Mar 12, 2024Updated last year
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accountsβ1,369Oct 22, 2025Updated 4 months ago
- An Open-source LTE Downlink/Uplink Eavesdropperβ2,133Oct 23, 2024Updated last year
- MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.β12,156Feb 19, 2026Updated last week
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.β2,182Jan 5, 2026Updated last month
- β‘ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes β‘β21,078Mar 5, 2025Updated 11 months ago
- Universal Radio Hacker: Investigate Wireless Protocols Like A Bossβ12,212Dec 19, 2025Updated 2 months ago
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windowsβ¦β2,055Dec 11, 2024Updated last year
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.β16,768Dec 15, 2024Updated last year
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of β¦β14,645Oct 6, 2025Updated 4 months ago
- Wi-Fi Exploitation Frameworkβ2,764Sep 24, 2025Updated 5 months ago
- Depix is a PoC for a technique to recover plaintext from pixelized screenshots.β3,979Apr 16, 2025Updated 10 months ago
- RDP monster-in-the-middle (mitm) and library for Python with the ability to watch connections live or after the factβ1,757Jul 27, 2025Updated 7 months ago
- Simple (relatively) things allowing you to dig a bit deeper than usual.β3,481Feb 16, 2026Updated last week
- π¬ A collection of awesome resources for the Flipper Zero device.β22,900Sep 27, 2024Updated last year
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enablβ¦β27,194Updated this week
- The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysisβ34,101Feb 20, 2026Updated last week
- Find, verify, and analyze leaked credentialsβ24,643Feb 20, 2026Updated last week
- A list of useful payloads and bypass for Web Application Security and Pentest/CTFβ75,488Feb 16, 2026Updated last week
- Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (cβ¦β1,051Nov 9, 2024Updated last year
- Terminal-based toolkit for GitHub data analysis.β1,886Jan 23, 2026Updated last month
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttlingβ1,258Mar 19, 2025Updated 11 months ago
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.β3,421Jan 19, 2025Updated last year
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, fβ¦β4,348Sep 30, 2024Updated last year
- Gather and update all available and newest CVEs with their PoC.β7,551Updated this week
- π Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.shβ3,610Nov 14, 2025Updated 3 months ago
- EMBA - The firmware security analyzerβ3,365Feb 16, 2026Updated last week
- The Deepfake Offensive Toolkitβ4,532Jun 14, 2024Updated last year
- Arsenal is just a quick inventory and launcher for hacking programsβ3,687Nov 29, 2024Updated last year
- The recursive internet scanner for hackers. π§‘β9,450Updated this week