ggerganov / kbd-audioLinks
π€β¨οΈ Acoustic keyboard eavesdropping
β8,879Updated 2 years ago
Alternatives and similar repositories for kbd-audio
Users that are interested in kbd-audio are comparing it to the libraries listed below
Sorting:
- A terminal UI for tshark, inspired by Wiresharkβ9,531Updated last year
- β‘ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes β‘β19,812Updated 5 months ago
- πΈ Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell β¦β6,980Updated last year
- World's fastest and most advanced password recovery utilityβ23,977Updated this week
- KeyDecoder app lets you use your smartphone or tablet to decode your mechanical keys in seconds.β3,145Updated last year
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.β17,981Updated this week
- Depix is a PoC for a technique to recover plaintext from pixelized screenshots.β542Updated 4 months ago
- Serverless, peer-to-peer, local file sharing through soundβ2,280Updated 4 years ago
- Pack up to 3MB of data into a tweetable PNG polyglot file.β2,565Updated 4 years ago
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victimβs NAT/firewaβ¦β1,949Updated 2 years ago
- The world's most hated IT stickersβ8,972Updated last year
- The Deepfake Offensive Toolkitβ4,420Updated last year
- Like nmap for mapping wifi networks you're not connected to, plus device trackingβ2,683Updated last year
- Hardware backdoors in some x86 CPUsβ2,374Updated 6 years ago
- An open-source digital image forensic toolsetβ2,967Updated last month
- MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.β11,505Updated this week
- List of awesome reverse engineering resourcesβ9,515Updated 2 years ago
- π¦ Record your terminal and generate animated gif images or share a web playerβ15,935Updated 11 months ago
- Linux/OSX/FreeBSD resource monitorβ11,018Updated last year
- A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.β12,533Updated this week
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLYβ3,225Updated 2 years ago
- Detect file content types with deep learningβ8,753Updated last week
- Hide secrets with invisible characters in plain text securely using passwords π§π»ββοΈββ3,607Updated 10 months ago
- magic-trace collects and displays high-resolution traces of what a process is doingβ5,042Updated last month
- A fully-modern text-based browser, rendering to TTY and browsersβ17,728Updated last month
- Crack WPA/WPA2 Wi-Fi Routers with Airodump-ng and Aircrack-ng/Hashcatβ11,970Updated 7 months ago
- Answering the question nobody asked: what if you wanted to text your friends using only ARP?β2,545Updated 2 years ago
- HiddenVM β Use any desktop OS without leaving a trace.β2,464Updated last year
- Disk Usage/Free Utility - a better 'df' alternativeβ13,603Updated last year
- File formats dissections and more...β10,967Updated last year