BishopFox / unredacterLinks
Never ever ever use pixelation as a redaction technique
☆8,185Updated last year
Alternatives and similar repositories for unredacter
Users that are interested in unredacter are comparing it to the libraries listed below
Sorting:
- KeyDecoder app lets you use your smartphone or tablet to decode your mechanical keys in seconds.☆3,161Updated last year
- Browser In The Browser (BITB) Templates☆2,875Updated last year
- Pack up to 3MB of data into a tweetable PNG polyglot file.☆2,576Updated 4 years ago
- Depix is a PoC for a technique to recover plaintext from pixelized screenshots.☆3,776Updated 8 months ago
- 🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell …☆7,115Updated 2 years ago
- An open-source digital image forensic toolset☆3,066Updated 5 months ago
- ⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡☆20,282Updated 9 months ago
- Scanning APK file for URIs, endpoints & secrets.☆5,769Updated 4 months ago
- Makes reverse engineering Android apps easier, automating repetitive tasks like pulling, decoding, rebuilding and patching an APK.☆3,649Updated 7 months ago
- 🕵️♂️ Offensive Google framework.☆18,242Updated 3 months ago
- 🎤⌨️ Acoustic keyboard eavesdropping☆8,943Updated 2 years ago
- Craft PNG files that appear completely different in Apple software [NOW PATCHED]☆1,064Updated 3 years ago
- a drop-in replacement for Nmap powered by shodan.io☆3,149Updated 8 months ago
- Recovers pixelized text from images☆231Updated 3 years ago
- The fastest and more comprehensive multiprotocol credentials bruteforcer / password sprayer and enumerator. 🥷☆1,778Updated 3 months ago
- ☆1,283Updated 8 months ago
- ☆2,080Updated 4 years ago
- Play lunar lander in you windows file copy dialog☆3,616Updated 9 months ago
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock☆7,083Updated last year
- Web Attack Cheat Sheet☆4,396Updated 3 weeks ago
- Answering the question nobody asked: what if you wanted to text your friends using only ARP?☆2,543Updated 2 years ago
- Indicators of Compromise from Amnesty International's cyber investigations☆1,636Updated last year
- A temporary email right from your terminal written in POSIX sh☆4,157Updated last year
- Hide secrets with invisible characters in plain text securely using passwords 🧙🏻♂️⭐☆3,753Updated last year
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,186Updated 2 months ago
- ☆2,510Updated 3 years ago
- Convert Apple NeuralHash model for CSAM Detection to ONNX.☆1,535Updated 4 years ago
- Remote Desktop entirely coded in PowerShell.☆2,228Updated last year
- Clone a voice in 5 seconds to generate arbitrary speech in real-time☆59,125Updated 2 weeks ago
- Face Depixelizer based on "PULSE: Self-Supervised Photo Upsampling via Latent Space Exploration of Generative Models" repository.☆2,558Updated 11 months ago