MaximeBeasse / KeyDecoderLinks
KeyDecoder app lets you use your smartphone or tablet to decode your mechanical keys in seconds.
☆3,132Updated last year
Alternatives and similar repositories for KeyDecoder
Users that are interested in KeyDecoder are comparing it to the libraries listed below
Sorting:
- Tool for using wireless signals to see if you're being followed.☆635Updated 3 months ago
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,115Updated 7 months ago
- 🐙 Track down GitHub users.☆906Updated 3 weeks ago
- OSINT from your favorite services in a friendly terminal user interface - integrations for Virustotal, Shodan, and Censys☆1,075Updated 2 months ago
- An Open-source LTE Downlink/Uplink Eavesdropper☆1,940Updated 7 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,441Updated 2 years ago
- Heimdall WiFi Radar ESP8266☆567Updated 5 years ago
- Wi-Fi Exploitation Framework☆2,543Updated 9 months ago
- P4wnP1 is a highly customizable USB attack platform, based on a low cost Raspberry Pi Zero or Raspberry Pi Zero W.☆4,199Updated 9 months ago
- P4wnP1 A.L.O.A. by MaMe82 is a framework which turns a Rapsberry Pi Zero W into a flexible, low-cost platform for pentesting, red teaming…☆4,024Updated last year
- a drop-in replacement for Nmap powered by shodan.io☆3,042Updated last month
- A multiprotocol credentials bruteforcer / password sprayer and enumerator. 🥷☆1,596Updated 3 months ago
- GooFuzz is a tool to perform fuzzing with an OSINT approach, managing to enumerate directories, files, subdomains or parameters without l…☆1,458Updated 2 weeks ago
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality…☆4,127Updated 2 weeks ago
- GitHub Data Analysis Framework.☆1,854Updated 11 months ago
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,355Updated 3 months ago
- Printer Exploitation Toolkit - The tool that made dumpster diving obsolete.☆4,083Updated 10 months ago
- 📱 Andriller - is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-de…☆1,424Updated 2 years ago
- ☆1,268Updated last month
- Powerful framework for rogue access point attack.☆2,190Updated last year
- a file-sharing tool that allows you to find the responsible person in case of a leakage☆1,056Updated 3 years ago
- Tunneling Internet traffic over Whatsapp☆2,284Updated 2 years ago
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,563Updated 3 months ago
- Makes reverse engineering Android apps easier, automating repetitive tasks like pulling, decoding, rebuilding and patching an APK.☆3,469Updated 2 weeks ago
- The all-in-one browser extension for offensive security professionals 🛠☆6,095Updated 5 months ago
- Scanning APK file for URIs, endpoints & secrets.☆5,312Updated 2 months ago
- A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Boun…☆8,757Updated 2 weeks ago
- This tool extracts and displays data from the Recall feature in Windows 11, providing an easy way to access information about your PC's a…☆2,021Updated 11 months ago
- A stealth AirTag clone that bypasses all of Apple's tracking protection features☆1,173Updated 3 years ago
- Extract files from any kind of container formats☆2,315Updated this week