rodrigoalvesvieira / SoundKeylogger
An experimental project to demonstrate how a user keyboard input may be sniffed through the pattern analysis of the sounds emitted by the keystrokes.
☆67Updated 8 years ago
Alternatives and similar repositories for SoundKeylogger:
Users that are interested in SoundKeylogger are comparing it to the libraries listed below
- log file scrubber☆16Updated 6 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆55Updated 7 years ago
- Python malware for pentesters that bypasses most antivirus (signature and heuristics) and IPS using sheer stupidity☆76Updated 11 years ago
- Take full control of a OSX user or root account via command line.☆99Updated 6 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆147Updated 4 years ago
- Protect your parents from phishing☆39Updated 7 years ago
- Origami is a Ruby framework designed to parse, analyze, and forge PDF documents.☆50Updated 11 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆23Updated 7 years ago
- Simple reverse ICMP shell☆41Updated 11 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- WARCARRIER RF Scanning Terminal with Advanced Logging Features☆57Updated 6 years ago
- Utilize Pastebin's scraping API to find interesting pastes.☆16Updated 5 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 10 years ago
- A multi service threaded MD5 cracker☆66Updated 8 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 11 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Updated 8 years ago
- An attacker-oriented library for the Teensy 3.1 microcontroller.☆44Updated 10 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 8 years ago
- Docker container to run PoisonTap☆15Updated 8 years ago
- ☆16Updated 8 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆37Updated 7 years ago
- Universal MITM web server☆107Updated 7 years ago
- Truehunter☆31Updated 3 years ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Updated 6 years ago
- Entropic Password Manager Generator is a cross-platform, most secure and storageless password manager that generates passwords☆22Updated 4 years ago
- Download files out of open AWS buckets☆39Updated 6 years ago
- A hacked together PHP shell designed to be stealthy and portable☆52Updated 11 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆47Updated 8 years ago
- Exploit using barcodes, QRcodes, earn13, datamatrix☆113Updated 9 years ago