MaximeBeasse / KeyDecoder
KeyDecoder app lets you use your smartphone or tablet to decode your mechanical keys in seconds.
☆3,063Updated 9 months ago
Related projects ⓘ
Alternatives and complementary repositories for KeyDecoder
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,283Updated last year
- Tool for using wireless signals to see if you're being followed.☆631Updated 2 years ago
- GooFuzz is a tool to perform fuzzing with an OSINT approach, managing to enumerate directories, files, subdomains or parameters without l…☆1,347Updated 6 months ago
- An open-source digital image forensic toolset☆2,670Updated 2 weeks ago
- P4wnP1 A.L.O.A. by MaMe82 is a framework which turns a Rapsberry Pi Zero W into a flexible, low-cost platform for pentesting, red teaming…☆3,781Updated last year
- GitHub Data Analysis Framework.☆1,818Updated 5 months ago
- Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.☆4,111Updated 3 weeks ago
- One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️☆5,739Updated 2 months ago
- An OSINT tool to search for accounts by username and email in social networks.☆2,869Updated 2 months ago
- Homemade Pwnbox / Rogue AP based on Raspberry Pi — WiFi Hacking Cheatsheets + MindMap☆1,703Updated 8 months ago
- OSINT from your favorite services in a friendly terminal user interface - integrations for Virustotal, Shodan, and Censys☆989Updated 2 months ago
- Search WiFi geolocation data by BSSID and SSID on different public databases.☆954Updated last year
- Upload arbitrary data via Apple's Find My network.☆1,800Updated last year
- Tunneling Internet traffic over Whatsapp☆2,152Updated last year
- Simple (relatively) things allowing you to dig a bit deeper than usual.☆3,212Updated this week
- Collections of tools and methods created to aid in OSINT collection☆2,834Updated last year
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,358Updated 2 years ago
- 🐙 Track down GitHub users.☆840Updated last month
- A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Boun…☆7,791Updated last week
- A multiprotocol credentials bruteforcer / password sprayer and enumerator. 🥷☆1,459Updated 3 months ago
- A stealth AirTag clone that bypasses all of Apple's tracking protection features☆1,106Updated 2 years ago
- (⌐■_■) - Deep Reinforcement Learning instrumenting bettercap for WiFi pwning.☆7,763Updated 3 months ago
- Quickly discover exposed hosts on the internet using multiple search engines.☆2,426Updated this week
- Network Analysis Tool☆3,030Updated last year
- apk.sh makes reverse engineering Android apps easier, automating some repetitive tasks like pulling, decoding, rebuilding and patching an…☆3,351Updated 3 months ago
- P4wnP1 is a highly customizable USB attack platform, based on a low cost Raspberry Pi Zero or Raspberry Pi Zero W.☆4,045Updated 3 months ago
- An HTTP toolkit for security research.☆6,136Updated 7 months ago
- Fully featured and community-driven hacking environment☆1,949Updated 2 weeks ago