MaximeBeasse / KeyDecoderLinks
KeyDecoder app lets you use your smartphone or tablet to decode your mechanical keys in seconds.
☆3,168Updated 2 years ago
Alternatives and similar repositories for KeyDecoder
Users that are interested in KeyDecoder are comparing it to the libraries listed below
Sorting:
- Tool for using wireless signals to see if you're being followed.☆685Updated 11 months ago
- An open-source digital image forensic toolset☆3,091Updated 6 months ago
- OSINT from your favorite services in a friendly terminal user interface - integrations for Virustotal, Shodan, and Censys☆1,231Updated last month
- a file-sharing tool that allows you to find the responsible person in case of a leakage☆1,103Updated 4 years ago
- Wi-Fi Exploitation Framework☆2,761Updated 4 months ago
- The RF and reverse engineering framework for everyone. Follow and ★ to show your support!☆1,868Updated 2 weeks ago
- Store files as YouTube videos == infinite disk space☆1,936Updated 7 years ago
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,189Updated 4 months ago
- Terminal-based toolkit for GitHub data analysis.☆1,887Updated 2 weeks ago
- Tunneling Internet traffic over Whatsapp☆3,138Updated 3 years ago
- The fastest and more comprehensive multiprotocol credentials bruteforcer / password sprayer and enumerator. 🥷☆1,788Updated 4 months ago
- Never ever ever use pixelation as a redaction technique☆8,197Updated last year
- A stealth AirTag clone that bypasses all of Apple's tracking protection features☆1,223Updated 3 years ago
- Protect yourself from being tracked 🌍 by AirTags 🏷 and Find My accessories 📍☆2,225Updated this week
- audible feedback on just how much your browsing feeds into google☆2,230Updated last year
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,398Updated 11 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,475Updated 3 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆3,593Updated 2 months ago
- PoC to record audio from a Bluetooth device☆1,559Updated last year
- OFRAK: unpack, modify, and repack binaries.☆2,020Updated last week
- 🐙 Track down GitHub users.☆968Updated 4 months ago
- 🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell …☆7,139Updated 2 years ago
- ☆1,283Updated 9 months ago
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,629Updated last month
- GooFuzz is a tool to perform fuzzing with an OSINT approach, managing to enumerate directories, files, subdomains or parameters without l…☆1,551Updated last month
- Open-source tool to bypass windows and linux passwords from bootable usb☆1,963Updated 2 years ago
- Search WiFi geolocation data by BSSID and SSID on different public databases.☆1,202Updated last year
- Browser In The Browser (BITB) Templates☆2,876Updated 2 years ago
- AutoPWN Suite is a project for scanning vulnerabilities and exploiting systems automatically.☆1,039Updated 3 weeks ago
- A collection of all the data i could extract from 1 billion leaked credentials from internet.☆3,230Updated 5 years ago