ggerganov / kbd-audioLinks
π€β¨οΈ Acoustic keyboard eavesdropping
β8,937Updated 2 years ago
Alternatives and similar repositories for kbd-audio
Users that are interested in kbd-audio are comparing it to the libraries listed below
Sorting:
- β‘ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes β‘β20,214Updated 8 months ago
- Depix is a PoC for a technique to recover plaintext from pixelized screenshots.β2,806Updated 7 months ago
- Hash collisions and exploitationsβ3,290Updated 9 months ago
- Most advanced XSS scanner.β14,520Updated 7 months ago
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.β18,515Updated last week
- Ping, but with a graphβ12,157Updated last week
- The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysisβ33,279Updated 3 months ago
- Serverless, peer-to-peer, local file sharing through soundβ2,294Updated 4 years ago
- Never ever ever use pixelation as a redaction techniqueβ8,165Updated last year
- Sha256 Algorithm Explainedβ1,705Updated last year
- π€ The Modern Port Scanner π€β18,601Updated last week
- TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.β25,111Updated 5 months ago
- Transfer files over wifi from your computer to your mobile device by scanning a QR code without leaving the terminal.β10,375Updated 2 months ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)β18,861Updated this week
- βποΈ The minimal, blazing-fast, and infinitely customizable prompt for any shell!β52,478Updated last week
- A command-line tool and Rust library with Python bindings for generating regular expressions from user-provided test casesβ7,903Updated last week
- RSA attack tool (mainly for ctf) - retrieve private key from weak public key and/or uncipher dataβ6,599Updated 3 weeks ago
- A collection of all the data i could extract from 1 billion leaked credentials from internet.β3,200Updated 5 years ago
- π A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.β51,775Updated this week
- An open-source digital image forensic toolsetβ3,051Updated 4 months ago
- Pack up to 3MB of data into a tweetable PNG polyglot file.β2,581Updated 4 years ago
- Crack legacy zip encryption with Biham and Kocher's known plaintext attack.β2,015Updated 2 weeks ago
- Free and Open Source Reverse Engineering Platform powered by rizinβ18,073Updated 2 weeks ago
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victimβs NAT/firewaβ¦β1,951Updated 2 years ago
- β2,509Updated 2 years ago
- π΅οΈββοΈ Offensive Google framework.β18,155Updated last month
- Count the number of people around you by monitoring wifi signalsβ7,049Updated last year
- the only cheat sheet you needβ40,519Updated 3 months ago
- Universal Radio Hacker: Investigate Wireless Protocols Like A Bossβ11,977Updated this week
- A fast, simple, recursive content discovery tool written in Rust.β7,246Updated this week