MaximeBeasse / KeyDecoderLinks
KeyDecoder app lets you use your smartphone or tablet to decode your mechanical keys in seconds.
☆3,136Updated last year
Alternatives and similar repositories for KeyDecoder
Users that are interested in KeyDecoder are comparing it to the libraries listed below
Sorting:
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,445Updated 2 years ago
- Never ever ever use pixelation as a redaction technique☆8,055Updated last year
- OFRAK: unpack, modify, and repack binaries.☆1,958Updated last week
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,123Updated 8 months ago
- Makes reverse engineering Android apps easier, automating repetitive tasks like pulling, decoding, rebuilding and patching an APK.☆3,478Updated last month
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆790Updated 2 years ago
- A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Boun…☆8,871Updated last month
- 🐙 Track down GitHub users.☆910Updated last month
- Heimdall WiFi Radar ESP8266☆568Updated 5 years ago
- GitHub Data Analysis Framework.☆1,856Updated last year
- MouseJack device discovery and research tools☆1,343Updated 7 years ago
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewa…☆1,927Updated 2 years ago
- A collection of all the data i could extract from 1 billion leaked credentials from internet.☆3,153Updated 4 years ago
- A collaboratively curated list of awesome Open-Source Intelligence (OSINT) Resources☆2,147Updated last month
- PoC to record audio from a Bluetooth device☆1,334Updated last year
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆3,059Updated last month
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,262Updated 5 months ago
- Various tips & tricks☆3,455Updated 2 weeks ago
- OSINT from your favorite services in a friendly terminal user interface - integrations for Virustotal, Shodan, and Censys☆1,080Updated 2 months ago
- ☆1,496Updated 2 years ago
- The Deepfake Offensive Toolkit☆4,349Updated last year
- Get IP address on other side audio call in Telegram.☆1,793Updated last year
- A collection of several hundred online tools for OSINT☆6,504Updated this week
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,088Updated 11 months ago
- 🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell …☆6,912Updated last year
- An open-source digital image forensic toolset☆2,935Updated last month
- ☆995Updated 2 years ago
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality…☆4,141Updated last month
- A simple, very experimental TPM sniffer for LPC bus☆603Updated last year
- The Havoc Framework☆7,631Updated 5 months ago