Convert IR signals from a remote control into keystrokes using customizable mapping files. Similar in concept to Girder. Supports USB-UIRT and IR Trans receivers. Useful for controlling PVR software that doesn't directly support your receiver.
Categories
Video CaptureLicense
GNU Library or Lesser General Public License version 2.0 (LGPLv2)Follow Remote 2 Key
Other Useful Business Software
Attack Surface Management | Criminal IP ASM
Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
Rate This Project
Login To Rate This Project
User Reviews
Be the first to post a review of Remote 2 Key!