MaximeBeasse / KeyDecoder
KeyDecoder app lets you use your smartphone or tablet to decode your mechanical keys in seconds.
β3,132Updated last year
Alternatives and similar repositories for KeyDecoder:
Users that are interested in KeyDecoder are comparing it to the libraries listed below
- π Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.shβ3,002Updated last month
- Wi-Fi Exploitation Frameworkβ2,524Updated 7 months ago
- An open-source digital image forensic toolsetβ2,873Updated this week
- OSINT from your favorite services in a friendly terminal user interface - integrations for Virustotal, Shodan, and Censysβ1,011Updated 2 weeks ago
- A stealth AirTag clone that bypasses all of Apple's tracking protection featuresβ1,167Updated 3 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.β1,440Updated 2 years ago
- a drop-in replacement for Nmap powered by shodan.ioβ3,006Updated 2 months ago
- π΅οΈββοΈ Offensive Google framework.β16,401Updated 2 months ago
- a file-sharing tool that allows you to find the responsible person in case of a leakageβ1,052Updated 3 years ago
- π± Andriller - is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-deβ¦β1,406Updated 2 years ago
- A multiprotocol credentials bruteforcer / password sprayer and enumerator. π₯·β1,577Updated last month
- πSearches Hash APIs to crack your hash quicklyπ If hash is not found, automatically pipes into HashCatβ‘β1,344Updated last month
- This program show you IMSI numbers of cellphones around you.β3,331Updated 4 months ago
- The all-in-one browser extension for offensive security professionals πβ6,042Updated 3 months ago
- OFRAK: unpack, modify, and repack binaries.β1,938Updated this week
- Offensive Software Exploitation Courseβ2,365Updated last year
- πͺ Leak git repositories from misconfigured websitesβ1,568Updated 2 years ago
- Fetch information about a public Google document.β871Updated last year
- Collection of malware source code for a variety of platforms in an array of different programming languages.β16,699Updated 5 months ago
- GooFuzz is a tool to perform fuzzing with an OSINT approach, managing to enumerate directories, files, subdomains or parameters without lβ¦β1,423Updated last year
- Extract files from any kind of container formatsβ2,305Updated this week
- A simple command line tool using which you can skip phone number based SMS verification by using a temporary phone number that acts like β¦β2,745Updated last year
- Connect like there is no firewall. Securely.β1,671Updated this week
- The RF and reverse engineering framework for everyone. Follow and β to show your support!β1,719Updated last week
- π Track down GitHub users.β896Updated 2 months ago
- Web Attack Cheat Sheetβ4,270Updated last week
- Heimdall WiFi Radar ESP8266β566Updated 5 years ago
- Store files as YouTube videos == infinite disk spaceβ1,914Updated 6 years ago
- An Open-source LTE Downlink/Uplink Eavesdropperβ1,918Updated 6 months ago
- You didn't think I'd go and leave the blue team out, right?β1,651Updated last year