BishopFox / unredacter
Never ever ever use pixelation as a redaction technique
β7,858Updated 10 months ago
Alternatives and similar repositories for unredacter:
Users that are interested in unredacter are comparing it to the libraries listed below
- π΅οΈββοΈ Collect a dossier on a person by username from thousands of sitesβ13,873Updated last week
- An open-source digital image forensic toolsetβ2,738Updated 2 months ago
- KeyDecoder app lets you use your smartphone or tablet to decode your mechanical keys in seconds.β3,081Updated 11 months ago
- An HTTP toolkit for security research.β6,174Updated this week
- Depix is a PoC for a technique to recover plaintext from pixelized screenshots.β136Updated 3 weeks ago
- πΈ Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell β¦β6,757Updated last year
- Pack up to 3MB of data into a tweetable PNG polyglot file.β2,554Updated 3 years ago
- a file-sharing tool that allows you to find the responsible person in case of a leakageβ1,048Updated 2 years ago
- π΅οΈββοΈ Offensive Google framework.β15,980Updated last week
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.β17,041Updated last week
- The world's most hated IT stickersβ8,798Updated 5 months ago
- ClearURLs is an add-on based on the new WebExtensions technology and will automatically remove tracking elements from URLs to help protecβ¦β4,119Updated last week
- A collection of several hundred online tools for OSINTβ5,716Updated 5 months ago
- Skip YouTube video sponsors (browser extension)β10,682Updated this week
- β‘ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes β‘β18,507Updated 9 months ago
- Best practices for segmentation of the corporate network of any companyβ3,314Updated 10 months ago
- Build your own 'AirTags' π· today! Framework for tracking personal Bluetooth devices via Apple's massive Find My network.β9,355Updated 6 months ago
- π Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.shβ2,916Updated 2 weeks ago
- Extract files from any kind of container formatsβ2,254Updated this week
- Crack legacy zip encryption with Biham and Kocher's known plaintext attack.β1,726Updated 3 weeks ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.β1,373Updated 2 years ago
- Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic lβ¦β2,619Updated 3 years ago
- People tracker on the Internet: OSINT analysis and research tool by Jose Pinoβ8,174Updated 6 months ago
- Convert Apple NeuralHash model for CSAM Detection to ONNX.β1,535Updated 3 years ago
- Hunt down social media accounts by username across social networksβ61,779Updated 2 months ago
- HiddenVM β Use any desktop OS without leaving a trace.β2,386Updated 5 months ago
- Extract and decrypt browser data, supporting multiple data types, runnable on various operating systems (macOS, Windows, Linux).β11,674Updated last week
- Tunneling Internet traffic over Whatsappβ2,168Updated 2 years ago
- Network Analysis Toolβ3,064Updated last year