KBD-Audio is a collection of command-line and GUI tools for capturing and analyzing audio data. The most interesting tool is called keytap – it can guess pressed keyboard keys only by analyzing the audio captured from the computer’s microphone.
git clone https://github.com/ggerganov/kbd-audio
cd kbd-audio
git submodule update --init
mkdir build && cd build
cmake ..
make Also ReadNodeJsScan – Static Security Code Scanner For Node.js Applications
Record audio to a raw binary file on disk
Usage: ./record-full output.kbd Playback a recording captured via the record-full tool
Usage: ./play-full input.kbd Record audio only while typing. Useful for collecting training data for keytap
Usage: ./record output.kbd Playback a recording created via the record tool
Usage: ./play input.kbd Detect pressed keys via microphone audio capture in real-time. Uses training data captured via the record tool.
Usage: ./keytap-gui input0.kbd [input1.kbd] [input2.kbd] ... Detect pressed keys via microphone audio capture. Uses statistical information (n-gram frequencies) about the language. No training data is required. The ‘recording.kbd’ input file has to be generated via the record-full tool and contains the audio data that will be analyzed. The ‘n-gram.txt’ file has to contain n-gram probabilities for the corresponding language.
Usage: ./keytap2-gui recording.kbd n-gram.txt Visualize waveforms recorded with the record-full tool. Can also playback the audio data.
Usage: ./view-full-gui input.kbd
Visualize training data recorded with the record tool. Can also playback the audio data.
Usage: ./view-gui input.kbd What is a Software Supply Chain Attack? A software supply chain attack occurs when a…
When people ask how UDP works, the simplest answer is this: UDP sends data quickly…
Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…
A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…
How Does a Firewall Work Step by Step? What Is a Firewall and How Does…
People trying to securely connect to work are being tricked into doing the exact opposite.…