rodrigoalvesvieira / SoundKeylogger
An experimental project to demonstrate how a user keyboard input may be sniffed through the pattern analysis of the sounds emitted by the keystrokes.
☆67Updated 8 years ago
Alternatives and similar repositories for SoundKeylogger:
Users that are interested in SoundKeylogger are comparing it to the libraries listed below
- log file scrubber☆16Updated 6 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆36Updated 7 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- A script to generate wordlists out of wikipedia pages. Should support most of the subdomains. Some ugly code may occur☆31Updated 10 years ago
- Python malware for pentesters that bypasses most antivirus (signature and heuristics) and IPS using sheer stupidity☆76Updated 11 years ago
- Docker container to run PoisonTap☆15Updated 8 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆45Updated 8 years ago
- WARCARRIER RF Scanning Terminal with Advanced Logging Features☆57Updated 6 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆55Updated 6 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆147Updated 4 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆51Updated 7 years ago
- ☆19Updated 9 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Simple reverse ICMP shell☆41Updated 11 years ago
- Utilize Pastebin's scraping API to find interesting pastes.☆16Updated 5 years ago
- "Whatsapp Discover" is a tool for getting phone numbers of devices using Whatsapp by real time sniffing from an interface (disabled in th…☆20Updated 11 years ago
- Removed according to regulations☆35Updated 7 years ago
- Network based protocol fuzzer☆70Updated 3 years ago
- A OS X crypto ransomware PoC☆88Updated 9 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Updated 7 years ago
- Rogue AP killer☆89Updated 7 years ago
- Recursively searches a directory for any file containing a specified string☆45Updated 9 years ago
- Origami is a Ruby framework designed to parse, analyze, and forge PDF documents.☆50Updated 11 years ago
- unix wildcard attacks☆131Updated 6 years ago
- A shellcode testing harness.☆69Updated 8 months ago
- A proof of concept demonstrating the use of Google Drive for command and control.☆86Updated 6 years ago
- The Zonefile Transfer Toolkit☆28Updated 3 weeks ago
- Download files out of open AWS buckets☆38Updated 6 years ago
- A Cross-Platform Forensic Framework for Google Chrome☆69Updated 10 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 11 years ago