KeyDecoder app lets you use your smartphone or tablet to decode your mechanical keys in seconds.
β3,175Feb 4, 2024Updated 2 years ago
Alternatives and similar repositories for KeyDecoder
Users that are interested in KeyDecoder are comparing it to the libraries listed below
Sorting:
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password π‘οΈβ6,433Updated this week
- Tools and Techniques for Red Team / Penetration Testingβ8,568Mar 18, 2025Updated last year
- Never ever ever use pixelation as a redaction techniqueβ8,261Mar 15, 2024Updated 2 years ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory toolsβ2,159Mar 8, 2026Updated last week
- π΅οΈββοΈ Offensive Google framework.β18,535Updated this week
- RedEye is a visual analytic tool supporting Red & Blue Team operationsβ2,741Oct 20, 2023Updated 2 years ago
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accountsβ1,373Mar 9, 2026Updated last week
- π A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.β52,887Updated this week
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRsβ1,229Aug 18, 2023Updated 2 years ago
- π€β¨οΈ Acoustic keyboard eavesdroppingβ8,981Jan 15, 2023Updated 3 years ago
- Heimdall WiFi Radar ESP8266β575Sep 16, 2019Updated 6 years ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.β2,203Jan 5, 2026Updated 2 months ago
- Universal Radio Hacker: Investigate Wireless Protocols Like A Bossβ12,277Dec 19, 2025Updated 3 months ago
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sockβ7,113Mar 12, 2024Updated 2 years ago
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windowsβ¦β2,077Dec 11, 2024Updated last year
- An Open-source LTE Downlink/Uplink Eavesdropperβ2,140Oct 23, 2024Updated last year
- β‘ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes β‘β21,254Mar 5, 2025Updated last year
- π¬ A collection of awesome resources for the Flipper Zero device.β23,009Sep 27, 2024Updated last year
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of β¦β14,721Oct 6, 2025Updated 5 months ago
- MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.β12,212Mar 12, 2026Updated last week
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.β17,014Dec 15, 2024Updated last year
- Simple (relatively) things allowing you to dig a bit deeper than usual.β3,484Feb 16, 2026Updated last month
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enablβ¦β27,492Updated this week
- Arsenal is just a quick inventory and launcher for hacking programsβ3,707Nov 29, 2024Updated last year
- Real-world infosec wordlists, updated regularlyβ1,721Updated this week
- Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (cβ¦β1,054Nov 9, 2024Updated last year
- Wi-Fi Exploitation Frameworkβ2,773Sep 24, 2025Updated 5 months ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTFβ76,106Updated this week
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, fβ¦β4,356Sep 30, 2024Updated last year
- The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysisβ34,303Mar 11, 2026Updated last week
- RDP monster-in-the-middle (mitm) and library for Python with the ability to watch connections live or after the fact