KeyDecoder app lets you use your smartphone or tablet to decode your mechanical keys in seconds.
β3,187Feb 4, 2024Updated 2 years ago
Alternatives and similar repositories for KeyDecoder
Users that are interested in KeyDecoder are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password π‘οΈβ6,498Apr 12, 2026Updated 2 weeks ago
- Tools and Techniques for Red Team / Penetration Testingβ8,682Apr 18, 2026Updated last week
- Never ever ever use pixelation as a redaction techniqueβ8,298Mar 15, 2024Updated 2 years ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory toolsβ2,172Mar 8, 2026Updated last month
- π΅οΈββοΈ Offensive Google framework.β18,763Apr 10, 2026Updated 2 weeks ago
- Deploy to Railway using AI coding agents - Free Credits Offer β’ AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- RedEye is a visual analytic tool supporting Red & Blue Team operationsβ2,747Oct 20, 2023Updated 2 years ago
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accountsβ1,379Mar 9, 2026Updated last month
- π A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.β53,332Updated this week
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRsβ1,233Aug 18, 2023Updated 2 years ago
- π€β¨οΈ Acoustic keyboard eavesdroppingβ8,996Jan 15, 2023Updated 3 years ago
- Heimdall WiFi Radar ESP8266β575Sep 16, 2019Updated 6 years ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.β2,229Updated this week
- Universal Radio Hacker: Investigate Wireless Protocols Like A Bossβ12,367Dec 19, 2025Updated 4 months ago
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sockβ7,128Mar 12, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer β’ AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windowsβ¦β2,108Dec 11, 2024Updated last year
- β‘ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes β‘β21,362Updated this week
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.β17,594Apr 13, 2026Updated 2 weeks ago
- An Open-source LTE Downlink/Uplink Eavesdropperβ2,165Oct 23, 2024Updated last year
- MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.β12,342Apr 22, 2026Updated last week
- π¬ A collection of awesome resources for the Flipper Zero device.β23,263Sep 27, 2024Updated last year
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of β¦β15,003Oct 6, 2025Updated 6 months ago
- Simple (relatively) things allowing you to dig a bit deeper than usual.β3,496Apr 21, 2026Updated last week
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enablβ¦β28,094Updated this week
- Deploy to Railway using AI coding agents - Free Credits Offer β’ AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Arsenal is just a quick inventory and launcher for hacking programsβ3,717Nov 29, 2024Updated last year
- Real-world infosec wordlists, updated regularlyβ1,742Updated this week
- Wi-Fi Exploitation Frameworkβ2,775Sep 24, 2025Updated 7 months ago
- Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (cβ¦β1,113Nov 9, 2024Updated last year
- A list of useful payloads and bypass for Web Application Security and Pentest/CTFβ77,264Apr 22, 2026Updated last week
- RDP monster-in-the-middle (mitm) and library for Python with the ability to watch connections live or after the factβ1,766Jul 27, 2025Updated 9 months ago
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, fβ¦β4,368Sep 30, 2024Updated last year
- The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysisβ34,661Updated this week
- Terminal-based toolkit for GitHub data analysis.β1,891Feb 28, 2026Updated 2 months ago
- AI Agents on DigitalOcean Gradient AI Platform β’ AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Depix is a PoC for a technique to recover plaintext from pixelized screenshots.β4,521Apr 14, 2026Updated 2 weeks ago
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.β3,451Jan 19, 2025Updated last year
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttlingβ1,268Mar 19, 2025Updated last year
- Find, verify, and analyze leaked credentialsβ25,895Updated this week
- EMBA - The firmware security analyzerβ3,434Updated this week
- Flipper Zero Unleashed Firmwareβ21,455Updated this week
- The RF and reverse engineering framework for everyone. Follow and β to show your support!β1,952Mar 25, 2026Updated last month