KeyDecoder app lets you use your smartphone or tablet to decode your mechanical keys in seconds.
β3,183Feb 4, 2024Updated 2 years ago
Alternatives and similar repositories for KeyDecoder
Users that are interested in KeyDecoder are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password π‘οΈβ6,462Mar 28, 2026Updated last week
- Tools and Techniques for Red Team / Penetration Testingβ8,617Mar 18, 2025Updated last year
- Never ever ever use pixelation as a redaction techniqueβ8,288Mar 15, 2024Updated 2 years ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory toolsβ2,159Mar 8, 2026Updated last month
- π΅οΈββοΈ Offensive Google framework.β18,646Mar 14, 2026Updated 3 weeks ago
- 1-Click AI Models by DigitalOcean Gradient β’ AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- RedEye is a visual analytic tool supporting Red & Blue Team operationsβ2,743Oct 20, 2023Updated 2 years ago
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accountsβ1,376Mar 9, 2026Updated last month
- π A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.β53,086Apr 2, 2026Updated last week
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRsβ1,232Aug 18, 2023Updated 2 years ago
- π€β¨οΈ Acoustic keyboard eavesdroppingβ8,990Jan 15, 2023Updated 3 years ago
- Heimdall WiFi Radar ESP8266β575Sep 16, 2019Updated 6 years ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.β2,220Jan 5, 2026Updated 3 months ago
- Universal Radio Hacker: Investigate Wireless Protocols Like A Bossβ12,321Dec 19, 2025Updated 3 months ago
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sockβ7,115Mar 12, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways β’ AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windowsβ¦β2,081Dec 11, 2024Updated last year
- An Open-source LTE Downlink/Uplink Eavesdropperβ2,145Oct 23, 2024Updated last year
- β‘ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes β‘β21,300Updated this week
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.β17,329Dec 15, 2024Updated last year
- π¬ A collection of awesome resources for the Flipper Zero device.β23,137Sep 27, 2024Updated last year
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of β¦β14,816Oct 6, 2025Updated 6 months ago
- MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.β12,250Apr 1, 2026Updated last week
- Simple (relatively) things allowing you to dig a bit deeper than usual.β3,494Feb 16, 2026Updated last month
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enablβ¦β27,799Updated this week
- Bare Metal GPUs on DigitalOcean Gradient AI β’ AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Arsenal is just a quick inventory and launcher for hacking programsβ3,711Nov 29, 2024Updated last year
- Real-world infosec wordlists, updated regularlyβ1,732Updated this week
- Wi-Fi Exploitation Frameworkβ2,772Sep 24, 2025Updated 6 months ago
- Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (cβ¦β1,107Nov 9, 2024Updated last year
- A list of useful payloads and bypass for Web Application Security and Pentest/CTFβ76,678Mar 16, 2026Updated 3 weeks ago
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, fβ¦β4,366Sep 30, 2024Updated last year
- RDP monster-in-the-middle (mitm) and library for Python with the ability to watch connections live or after the factβ1,764Jul 27, 2025Updated 8 months ago
- The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysisβ34,485Updated this week
- Depix is a PoC for a technique to recover plaintext from pixelized screenshots.β4,509Apr 16, 2025Updated 11 months ago
- 1-Click AI Models by DigitalOcean Gradient β’ AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Terminal-based toolkit for GitHub data analysis.β1,889Feb 28, 2026Updated last month
- Find, verify, and analyze leaked credentialsβ25,338Apr 2, 2026Updated last week
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.β3,436Jan 19, 2025Updated last year
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttlingβ1,261Mar 19, 2025Updated last year
- EMBA - The firmware security analyzerβ3,418Apr 2, 2026Updated last week
- The RF and reverse engineering framework for everyone. Follow and β to show your support!β1,942Mar 25, 2026Updated 2 weeks ago
- Flipper Zero Unleashed Firmwareβ21,314Apr 1, 2026Updated last week