BishopFox / unredacterLinks
Never ever ever use pixelation as a redaction technique
☆8,212Updated last year
Alternatives and similar repositories for unredacter
Users that are interested in unredacter are comparing it to the libraries listed below
Sorting:
- An open-source digital image forensic toolset☆3,094Updated 6 months ago
- KeyDecoder app lets you use your smartphone or tablet to decode your mechanical keys in seconds.☆3,169Updated 2 years ago
- Browser In The Browser (BITB) Templates☆2,876Updated 2 years ago
- Browser extension to spoof timezone, geolocation, locale and user agent.☆1,972Updated last year
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock☆7,109Updated last year
- 🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell …☆7,144Updated 2 years ago
- Web Attack Cheat Sheet☆4,394Updated last week
- holehe allows you to check if the mail is used on different sites like twitter, instagram and will retrieve information on sites with the…☆10,137Updated last year
- 🏔 Love Freedom - ❌ Block Mass Surveillance☆11,940Updated this week
- ⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡☆21,015Updated 11 months ago
- 🎤⌨️ Acoustic keyboard eavesdropping☆8,948Updated 3 years ago
- The Deepfake Offensive Toolkit☆4,491Updated last year
- A collection of all the data i could extract from 1 billion leaked credentials from internet.☆3,232Updated 5 years ago
- Portable Executable reversing tool with a friendly GUI☆3,475Updated 3 months ago
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️☆6,395Updated last month
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,631Updated last month
- Tunneling Internet traffic over Whatsapp☆3,139Updated 3 years ago
- Answering the question nobody asked: what if you wanted to text your friends using only ARP?☆2,540Updated 2 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆4,915Updated last week
- Simple C++ Image Steganography tool to encrypt and hide files inside images using Least-Significant-Bit encoding.☆1,062Updated last year
- Crack legacy zip encryption with Biham and Kocher's known plaintext attack.☆2,069Updated 2 months ago
- Extract and decrypt browser data, supporting multiple data types, runnable on various operating systems (macOS, Windows, Linux).☆13,489Updated 2 months ago
- Terminal-based toolkit for GitHub data analysis.☆1,886Updated 2 weeks ago
- SSH-MITM - ssh audits made simple☆1,428Updated 2 weeks ago
- audible feedback on just how much your browsing feeds into google☆2,231Updated last year
- Trojan Source: Invisible Vulnerabilities☆1,276Updated 2 years ago
- ☆1,283Updated 9 months ago
- a file-sharing tool that allows you to find the responsible person in case of a leakage☆1,103Updated 4 years ago
- Hash collisions and exploitations☆3,320Updated 11 months ago
- Store files as YouTube videos == infinite disk space☆1,936Updated 7 years ago