MaximeBeasse / KeyDecoderLinks
KeyDecoder app lets you use your smartphone or tablet to decode your mechanical keys in seconds.
☆3,141Updated last year
Alternatives and similar repositories for KeyDecoder
Users that are interested in KeyDecoder are comparing it to the libraries listed below
Sorting:
- Wi-Fi Exploitation Framework☆2,571Updated last month
- Tunneling Internet traffic over Whatsapp☆2,295Updated 2 years ago
- GitHub Data Analysis Framework.☆1,867Updated last year
- OSINT from your favorite services in a friendly terminal user interface - integrations for Virustotal, Shodan, and Censys☆1,096Updated 3 months ago
- A stealth AirTag clone that bypasses all of Apple's tracking protection features☆1,186Updated 3 years ago
- USB Army Knife – the ultimate close access tool for penetration testers and red teamers.☆1,699Updated last week
- The Deepfake Offensive Toolkit☆4,363Updated last year
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,129Updated 8 months ago
- Tool for using wireless signals to see if you're being followed.☆635Updated 5 months ago
- OFRAK: unpack, modify, and repack binaries.☆1,963Updated last week
- audible feedback on just how much your browsing feeds into google☆2,243Updated last year
- PoC to record audio from a Bluetooth device☆1,357Updated last year
- An Open-source LTE Downlink/Uplink Eavesdropper☆1,967Updated 8 months ago
- Heimdall WiFi Radar ESP8266☆568Updated 5 years ago
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality…☆4,157Updated last month
- 🐬 A collection of awesome resources for the Flipper Zero device.☆21,052Updated 9 months ago
- 🐙 Track down GitHub users.☆922Updated this week
- Never ever ever use pixelation as a redaction technique☆8,067Updated last year
- Open-source tool to bypass windows and linux passwords from bootable usb☆1,929Updated last year
- An open-source digital image forensic toolset☆2,943Updated this week
- A multiprotocol credentials bruteforcer / password sprayer and enumerator. 🥷☆1,638Updated 2 weeks ago
- This tool extracts and displays data from the Recall feature in Windows 11, providing an easy way to access information about your PC's a…☆2,030Updated last year
- GooFuzz is a tool to perform fuzzing with an OSINT approach, managing to enumerate directories, files, subdomains or parameters without l…☆1,469Updated last month
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆3,076Updated 2 weeks ago
- Offensive Software Exploitation Course☆2,374Updated 2 years ago
- A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Boun…☆8,934Updated last week
- ☆574Updated last week
- Homemade Pwnbox / Rogue AP based on Raspberry Pi — WiFi Hacking Cheatsheets + MindMap☆1,828Updated last year
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,116Updated 11 months ago
- Extract files from any kind of container formats☆2,331Updated this week