MaximeBeasse / KeyDecoderLinks
KeyDecoder app lets you use your smartphone or tablet to decode your mechanical keys in seconds.
☆3,155Updated last year
Alternatives and similar repositories for KeyDecoder
Users that are interested in KeyDecoder are comparing it to the libraries listed below
Sorting:
- Heimdall WiFi Radar ESP8266☆569Updated 6 years ago
- Tool for using wireless signals to see if you're being followed.☆675Updated 9 months ago
- A stealth AirTag clone that bypasses all of Apple's tracking protection features☆1,206Updated 3 years ago
- Tunneling Internet traffic over Whatsapp☆3,019Updated 2 years ago
- a file-sharing tool that allows you to find the responsible person in case of a leakage☆1,102Updated 3 years ago
- OSINT from your favorite services in a friendly terminal user interface - integrations for Virustotal, Shodan, and Censys☆1,208Updated 4 months ago
- The fastest and more comprehensive multiprotocol credentials bruteforcer / password sprayer and enumerator. 🥷☆1,762Updated 2 months ago
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,166Updated last month
- OFRAK: unpack, modify, and repack binaries.☆1,992Updated this week
- ☆1,281Updated 6 months ago
- The RF and reverse engineering framework for everyone. Follow and ★ to show your support!☆1,831Updated last week
- GitHub Data Analysis Framework.☆1,878Updated last year
- PoC to record audio from a Bluetooth device☆1,514Updated last year
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,471Updated 3 years ago
- Wi-Fi Exploitation Framework☆2,623Updated last month
- ☆589Updated 4 months ago
- Protect yourself from being tracked 🌍 by AirTags 🏷 and Find My accessories 📍☆2,170Updated last week
- ☆1,019Updated 3 years ago
- 🐙 Track down GitHub users.☆952Updated last month
- An Open-source LTE Downlink/Uplink Eavesdropper☆2,058Updated last year
- GooFuzz is a tool to perform fuzzing with an OSINT approach, managing to enumerate directories, files, subdomains or parameters without l…☆1,533Updated 6 months ago
- Network Analysis Tool☆3,299Updated 2 years ago
- USB Army Knife – the ultimate close access tool for penetration testers and red teamers.☆1,972Updated last month
- This program show you IMSI numbers of cellphones around you.☆3,659Updated 10 months ago
- A tool for testing for certificate validation vulnerabilities of TLS connections made by a client device or an application.☆705Updated last month
- A simple command line tool using which you can skip phone number based SMS verification by using a temporary phone number that acts like …☆2,768Updated 2 years ago
- Hundreds of Offensive and Useful Docker Images for Network Intrusion. The name says it all.☆1,245Updated last year
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewa…☆1,951Updated 2 years ago
- ☆715Updated last year
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆798Updated 3 years ago