KeyDecoder app lets you use your smartphone or tablet to decode your mechanical keys in seconds.
β3,186Feb 4, 2024Updated 2 years ago
Alternatives and similar repositories for KeyDecoder
Users that are interested in KeyDecoder are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password π‘οΈβ6,534Apr 12, 2026Updated last month
- Tools and Techniques for Red Team / Penetration Testingβ8,731Apr 18, 2026Updated last month
- Never ever ever use pixelation as a redaction techniqueβ8,301Mar 15, 2024Updated 2 years ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory toolsβ2,176Updated this week
- π΅οΈββοΈ Offensive Google framework.β18,947Apr 10, 2026Updated last month
- AI Agents on DigitalOcean Gradient AI Platform β’ AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- RedEye is a visual analytic tool supporting Red & Blue Team operationsβ2,748Oct 20, 2023Updated 2 years ago
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accountsβ1,388Mar 9, 2026Updated 2 months ago
- π A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.β53,605Updated this week
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRsβ1,234Aug 18, 2023Updated 2 years ago
- π€β¨οΈ Acoustic keyboard eavesdroppingβ9,004Jan 15, 2023Updated 3 years ago
- Heimdall WiFi Radar ESP8266β575Sep 16, 2019Updated 6 years ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.β2,252Apr 24, 2026Updated 3 weeks ago
- Universal Radio Hacker: Investigate Wireless Protocols Like A Bossβ12,404Dec 19, 2025Updated 5 months ago
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sockβ7,133Mar 12, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer β’ AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windowsβ¦β2,112Dec 11, 2024Updated last year
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.β17,743Apr 13, 2026Updated last month
- β‘ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes β‘β21,384May 6, 2026Updated 2 weeks ago
- An Open-source LTE Downlink/Uplink Eavesdropperβ2,170Oct 23, 2024Updated last year
- MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.β12,397May 12, 2026Updated last week
- π¬ A collection of awesome resources for the Flipper Zero device.β23,422Sep 27, 2024Updated last year
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of β¦β15,080Oct 6, 2025Updated 7 months ago
- Simple (relatively) things allowing you to dig a bit deeper than usual.β3,500Apr 21, 2026Updated 3 weeks ago
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enablβ¦β28,713Updated this week
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Arsenal is just a quick inventory and launcher for hacking programsβ3,729Nov 29, 2024Updated last year
- Wi-Fi Exploitation Frameworkβ2,899Sep 24, 2025Updated 7 months ago
- Real-world infosec wordlists, updated regularlyβ1,747Updated this week
- Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (cβ¦β1,117Nov 9, 2024Updated last year
- A list of useful payloads and bypass for Web Application Security and Pentest/CTFβ77,765Apr 22, 2026Updated 3 weeks ago
- RDP monster-in-the-middle (mitm) and library for Python with the ability to watch connections live or after the factβ1,768May 13, 2026Updated last week
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, fβ¦β4,373Sep 30, 2024Updated last year
- The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysisβ34,847Updated this week
- Depix is a PoC for a technique to recover plaintext from pixelized screenshots.β4,528Apr 14, 2026Updated last month
- Serverless GPU API endpoints on Runpod - Get Bonus Credits β’ AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Terminal-based toolkit for GitHub data analysis.β1,895Feb 28, 2026Updated 2 months ago
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.β3,457Jan 19, 2025Updated last year
- Find, verify, and analyze leaked credentialsβ26,288Updated this week
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttlingβ1,276Mar 19, 2025Updated last year
- EMBA - The firmware security analyzerβ3,460May 13, 2026Updated last week
- Flipper Zero Unleashed Firmwareβ21,569May 9, 2026Updated last week
- The RF and reverse engineering framework for everyone. Follow and β to show your support!β1,956Mar 25, 2026Updated last month