BishopFox / unredacterLinks
Never ever ever use pixelation as a redaction technique
☆8,138Updated last year
Alternatives and similar repositories for unredacter
Users that are interested in unredacter are comparing it to the libraries listed below
Sorting:
- Depix is a PoC for a technique to recover plaintext from pixelized screenshots.☆1,749Updated 6 months ago
- KeyDecoder app lets you use your smartphone or tablet to decode your mechanical keys in seconds.☆3,155Updated last year
- 🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell …☆7,075Updated last year
- Browser In The Browser (BITB) Templates☆2,852Updated last year
- Browser extension to spoof timezone, geolocation, locale and user agent.☆1,963Updated 10 months ago
- ⚠️ Browser fingerprinting via favicon!☆4,727Updated 2 years ago
- a file-sharing tool that allows you to find the responsible person in case of a leakage☆1,103Updated 3 years ago
- Scanning APK file for URIs, endpoints & secrets.☆5,679Updated 2 months ago
- 🕵️♂️ Collect a dossier on a person by username from thousands of sites☆17,768Updated last week
- Reverse Engineer's Toolkit☆5,101Updated 5 months ago
- An open-source digital image forensic toolset☆3,004Updated 3 months ago
- Pack up to 3MB of data into a tweetable PNG polyglot file.☆2,576Updated 4 years ago
- Fawkes, privacy preserving tool against facial recognition systems. More info at https://sandlab.cs.uchicago.edu/fawkes☆5,444Updated 2 years ago
- audible feedback on just how much your browsing feeds into google☆2,237Updated last year
- Trojan Source: Invisible Vulnerabilities☆1,272Updated 2 years ago
- Wi-Fi Exploitation Framework☆2,614Updated last month
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,160Updated 3 weeks ago
- Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for…☆935Updated 2 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,465Updated 3 years ago
- Tunneling Internet traffic over Whatsapp☆2,322Updated 2 years ago
- Portable Executable reversing tool with a friendly GUI☆3,322Updated this week
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️☆6,274Updated 2 months ago
- Invidious is an alternative front-end to YouTube☆18,059Updated last week
- SSH tarpit that slowly sends an endless banner☆8,326Updated last year
- a drop-in replacement for Nmap powered by shodan.io☆3,122Updated 5 months ago
- Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods☆14,924Updated last week
- An OSINT tool to search for accounts by username and email in social networks.☆4,957Updated 3 months ago
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock☆7,019Updated last year
- ☆2,077Updated 3 years ago
- 🎤⌨️ Acoustic keyboard eavesdropping☆8,916Updated 2 years ago