All Projects → MaximeBeasse → Keydecoder

MaximeBeasse / Keydecoder

Licence: other
KeyDecoder app lets you use your smartphone or tablet to decode your mechanical keys in seconds.

Programming Languages

dart
5743 projects

Projects that are alternatives of or similar to Keydecoder

Qsfuzz
qsfuzz (Query String Fuzz) allows you to build your own rules to fuzz query strings and easily identify vulnerabilities.
Stars: ✭ 201 (-14.83%)
Mutual labels:  infosec
Cardslidepanel
enable users to slide card to the left or right smoothly and continuously
Stars: ✭ 2,377 (+907.2%)
Mutual labels:  card
Slideovercard
A SwiftUI card view, made great for setup interactions.
Stars: ✭ 228 (-3.39%)
Mutual labels:  card
Secure Desktop
Anti-keylogger/anti-rat application for Windows
Stars: ✭ 201 (-14.83%)
Mutual labels:  infosec
Can I Take Over Xyz
"Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.
Stars: ✭ 2,808 (+1089.83%)
Mutual labels:  infosec
Ronin
Ronin is a Ruby platform for vulnerability research and exploit development. Ronin allows for the rapid development and distribution of code, Exploits or Payloads, Scanners, etc, via Repositories.
Stars: ✭ 220 (-6.78%)
Mutual labels:  infosec
Basecrack
Decode All Bases - Base Scheme Decoder
Stars: ✭ 196 (-16.95%)
Mutual labels:  infosec
Medium Zoom
🔎🖼 A JavaScript library for zooming images like Medium
Stars: ✭ 2,799 (+1086.02%)
Mutual labels:  picture
Zlayoutmanager
Some custom LayoutManager .Such as SwipeCard、FLowLayout。一些自定义的LayoutManager,仿探探、人人影视 炫动滑动 卡片层叠 和流式布局等。
Stars: ✭ 2,404 (+918.64%)
Mutual labels:  card
Cameradar
Cameradar hacks its way into RTSP videosurveillance cameras
Stars: ✭ 2,775 (+1075.85%)
Mutual labels:  infosec
Iky
OSINT Project
Stars: ✭ 203 (-13.98%)
Mutual labels:  infosec
Chameleonmini Rebooted
Chameleon Mini revE rebooted - Iceman Fork, the ChameleonMini is a versatile contactless smartcard emulator (NFC/RFID)
Stars: ✭ 208 (-11.86%)
Mutual labels:  card
Sec Admin
分布式资产安全扫描核心管理系统(弱口令扫描,漏洞扫描)
Stars: ✭ 222 (-5.93%)
Mutual labels:  infosec
Hawkeye
Hawkeye filesystem analysis tool
Stars: ✭ 202 (-14.41%)
Mutual labels:  infosec
Kubestriker
A Blazing fast Security Auditing tool for Kubernetes
Stars: ✭ 213 (-9.75%)
Mutual labels:  infosec
Pockint
A portable OSINT Swiss Army Knife for DFIR/OSINT professionals 🕵️ 🕵️ 🕵️
Stars: ✭ 196 (-16.95%)
Mutual labels:  infosec
Contact.sh
An OSINT tool to find contacts in order to report security vulnerabilities.
Stars: ✭ 216 (-8.47%)
Mutual labels:  infosec
Imageglass
🏞 A lightweight, versatile image viewer
Stars: ✭ 3,284 (+1291.53%)
Mutual labels:  picture
Reswipecard
a light lib for swipe the cards implemented by RecyclerView
Stars: ✭ 230 (-2.54%)
Mutual labels:  card
Autosqli
An automatic SQL Injection tool which takes advantage of ~DorkNet~ Googler, Ddgr, WhatWaf and sqlmap.
Stars: ✭ 222 (-5.93%)
Mutual labels:  infosec

KeyDecoder

      

KeyDecoder is a mobile app created for pentesters and security enthusiasts. From the picture of a key, one can measure its bitting easily.

Developped by Maxime BEASSE and Quentin CLEMENT.

In partnership with FrenchKey and CNS from ESIEA.

Powered by Flutter and OpenCV (4.3.0)

Summary

Disclamer

Making keys without consent is illegal.

This Key Decoding application is only meant for legal use. If you have unlawful intentions, you're are not allowed to use this application. To limit the risk of illegal use, an ISO sized card is necessary to decode a mechanical key, and the key must be taken off from its keyring. We will provide no help nor assistance to any user that we believe is willing to commit a crime or a felony.

Educational and Consulting use only.

This Key Decoding app is meant to be used by Pentesters during their audits, to explain to their clients how easily a criminal can duplicate keys (from picture, by molding, or simply by asking a local locksmith to make a duplicate). Fair use is allowed if used by security enthusiasts, to assess their own security, and discover the difficulty of making keys only using a picture. The authors DO NOT ALLOW any users to sell keys created with the help of this app. Rulebreakers are subject to lawsuit.

Security advice.

If you want to protect yourself from having your keys duplicated without your consent (with a picture, or by molding, or more simply by someone asking a locksmith to make a copy), you are invited to apply the same best practices to your keys as you do with your Credit Card or your Password. Just like credit cards and passwords, you must not lend your keys, or leave them unattended.

Have Fun, Stay Legal, Hide your keys.


Installation

Get it on Google Play

Build

Android

  • Download OpenCV v4.3.0
  • Create the local.properties file under android/, providing the following settings :
flutter.sdk=<Flutter SDK path>
flutter.buildMode=release
flutter.versionName=1.0.0
flutter.versionCode=1
opencv.sdk=<OpenCV Android SDK path>
  • Build the project using flutter build apk

IOS

IOS is not currently supported

Releases

The most recent builds can be found in the Play Store.

Usage

Take Picture

Take a picture of a key, removed from its key ring, and place in the middle of an ISO/CEI 7810 ID-1 sized card (credit card, business card...). It is very important that the card measures exactly 85,60 by 53,98 mm (3 3⁄8 in × 2 1⁄8 in).

A well lightened and high res picture will give better results.

Cropping

Use the green lines to crop the image to only retain the card. You can zoom to be more precise.

Back line

Align the red line to match the back of the key.

Shoulder line

Align the blue line to the shoulder of the key.

Measurements

Now, you can place points in the middle of each cuts of your key. Once done, you can validate and retrieve your measures on your project's page.

FAQ

What is the purpose of this application?

This application is a key decoder tool helping you getting the depths and spaces for a key you own or have legally access to. The decoded data can then be used with the help of a locksmith to obtain a duplicate of the pictured key.

What is the intended public for using this app?

The KeyDecoder app is built for security professionnals such as Pentesters and other security enthusiasts to be able to decode their own keys, or keys of the location they have a legal contract for.

What do you do with my pictures and decoded data?

Nothing. We do not transmit the pictures over the network, we do not retrieve any decoded data. Everything the user does with the app, is done locally on his/her phone. As a user, you are responsible for making sure that nobody else gets access to your pictures and decoded data.

Is this app helping criminals to copy my keys without my consent?

No. If you make sure to handle your keys with the care they deserve, no criminal will be able to use this application to copy your keys. Same as a Password or a Credit Card, a mechanical Key is a sensitive data that you should not share with anybody, and that you should not leave unattended. Otherwise, someone can easily go to a nearby locksmith, or make a molding duplicate in seconds. Additionnaly, the need for an ISO sized card as a dimensionnal reference prevents any decoding using a picture taken "on the fly". A criminal could copy your keys with this app only if you let them do it.


LIMITED WARRANTY

THE PROGRAM IS PROVIDED TO YOU "AS IS," WITHOUT WARRANTY. THERE IS NO WARRANTY FOR THE PROGRAM, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.

License

TL;DR :

You ARE NOT ALLOWED to make money (directly or indirectly) by distributing this application, its source code or a modification of them, or selling keys made with the help of this app. Of course, you ARE NOT ALLOWED to perform any illegal activity using this application.

You ARE ALLOWED to install, use, read, modify and distribute this application and its source code at no fee. You ARE ALLOWED to produce keys for your own use or to perform a pentest audits, both at your own risks.

You MUST give credit to original authors and copyright holders when you share this software or a modification of this software, and share it under the same conditions.

If you don't agree, delete it from your device.

The logo is under copyright and shall not be used without prior written consent of the copyright holder. The only use of the logo authorised is the use for this application and its derivatives as long as they respect the law and ethics.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].