BishopFox / unredacterLinks
Never ever ever use pixelation as a redaction technique
☆8,138Updated last year
Alternatives and similar repositories for unredacter
Users that are interested in unredacter are comparing it to the libraries listed below
Sorting:
- 🎤⌨️ Acoustic keyboard eavesdropping☆8,923Updated 2 years ago
 - Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆4,435Updated this week
 - KeyDecoder app lets you use your smartphone or tablet to decode your mechanical keys in seconds.☆3,156Updated last year
 - ⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡☆20,126Updated 7 months ago
 - a file-sharing tool that allows you to find the responsible person in case of a leakage☆1,103Updated 3 years ago
 - Depix is a PoC for a technique to recover plaintext from pixelized screenshots.☆2,625Updated 6 months ago
 - Browser In The Browser (BITB) Templates☆2,852Updated last year
 - 🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell …☆7,075Updated 2 years ago
 - An open-source digital image forensic toolset☆3,028Updated 3 months ago
 - dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,161Updated 3 weeks ago
 - Pack up to 3MB of data into a tweetable PNG polyglot file.☆2,578Updated 4 years ago
 - MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.☆11,798Updated last week
 - Browser extension to spoof timezone, geolocation, locale and user agent.☆1,963Updated 10 months ago
 - The Deepfake Offensive Toolkit☆4,450Updated last year
 - Store files as YouTube videos == infinite disk space☆1,926Updated 7 years ago
 - ClearURLs is an add-on based on the new WebExtensions technology and will automatically remove tracking elements from URLs to help protec…☆4,572Updated 3 months ago
 - ⚠️ Browser fingerprinting via favicon!☆4,732Updated 2 years ago
 - 🕵️♂️ Collect a dossier on a person by username from thousands of sites☆17,854Updated this week
 - Captchas don't have to be boring☆1,045Updated 9 months ago
 - holehe allows you to check if the mail is used on different sites like twitter, instagram and will retrieve information on sites with the…☆9,625Updated last year
 - Trojan Source: Invisible Vulnerabilities☆1,272Updated 2 years ago
 - GitHub Data Analysis Framework.☆1,877Updated last year
 - OFRAK: unpack, modify, and repack binaries.☆1,990Updated this week
 - Scanning APK file for URIs, endpoints & secrets.☆5,686Updated 2 months ago
 - A temporary email right from your terminal written in POSIX sh☆4,014Updated last year
 - The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis☆32,979Updated 2 months ago
 - Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,466Updated 3 years ago
 - A Browser Extension for faster reading on ANY website!☆3,979Updated 3 months ago
 - 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,384Updated 7 months ago
 - One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️☆6,284Updated 2 months ago