ggerganov / kbd-audio
π€β¨οΈ Acoustic keyboard eavesdropping
β8,748Updated 2 years ago
Alternatives and similar repositories for kbd-audio:
Users that are interested in kbd-audio are comparing it to the libraries listed below
- π΅οΈββοΈ Offensive Google framework.β16,401Updated 2 months ago
- Serverless, peer-to-peer, local file sharing through soundβ2,264Updated 4 years ago
- Free and Open Source Reverse Engineering Platform powered by rizinβ16,393Updated last week
- KeyDecoder app lets you use your smartphone or tablet to decode your mechanical keys in seconds.β3,129Updated last year
- πΈ Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell β¦β6,865Updated last year
- Darwin/macOS emulation layer for Linuxβ11,879Updated this week
- Modlishka. Reverse Proxy.β4,968Updated last year
- Easily and securely send things from one computer to anotherβ30,000Updated last week
- π A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.β48,289Updated last week
- Ghidra is a software reverse engineering (SRE) frameworkβ56,438Updated this week
- A terminal UI for tshark, inspired by Wiresharkβ9,372Updated 11 months ago
- An open-source digital image forensic toolsetβ2,873Updated this week
- Ah shhgit! Find secrets in your code. Secrets detection for your GitHub, GitLab and Bitbucket repositories.β3,886Updated last month
- John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating sβ¦β11,232Updated this week
- Hunt down social media accounts by username across social networksβ63,865Updated this week
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.β17,540Updated last week
- World's fastest and most advanced password recovery utilityβ22,494Updated 8 months ago
- Terminal session recorder πΉβ14,977Updated this week
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victimβs NAT/firewaβ¦β1,921Updated 2 years ago
- The Deepfake Offensive Toolkitβ4,298Updated 10 months ago
- Linux/OSX/FreeBSD resource monitorβ10,962Updated last year
- Port of OpenAI's Whisper model in C/C++β39,471Updated this week
- API, CLI, and Web App for analyzing and finding a person's profile in 1000 social media \ websitesβ12,336Updated 3 months ago
- Privacy-respecting metasearch engineβ13,473Updated last year
- A temporary email right from your terminal written in POSIX shβ3,941Updated 8 months ago
- Terminal bandwidth utilization toolβ10,465Updated 2 weeks ago
- TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.β24,384Updated 4 months ago
- Like nmap for mapping wifi networks you're not connected to, plus device trackingβ2,672Updated last year
- This program show you IMSI numbers of cellphones around you.β3,339Updated 4 months ago
- πΎ dn - offline full-text search and archiving for your Chromium-based browser.β3,834Updated 2 months ago