BishopFox / unredacterLinks
Never ever ever use pixelation as a redaction technique
☆8,094Updated last year
Alternatives and similar repositories for unredacter
Users that are interested in unredacter are comparing it to the libraries listed below
Sorting:
- Depix is a PoC for a technique to recover plaintext from pixelized screenshots.☆518Updated 3 months ago
- Browser In The Browser (BITB) Templates☆2,842Updated last year
- The Deepfake Offensive Toolkit☆4,368Updated last year
- 🕵️♂️ Offensive Google framework.☆16,704Updated 3 weeks ago
- Browser extension to spoof timezone, geolocation, locale and user agent.☆1,951Updated 7 months ago
- 🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell …☆6,953Updated last year
- An open-source digital image forensic toolset☆2,953Updated 2 weeks ago
- 🕵️♂️ Collect a dossier on a person by username from thousands of sites☆17,004Updated this week
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock☆6,961Updated last year
- Tunneling Internet traffic over Whatsapp☆2,300Updated 2 years ago
- a file-sharing tool that allows you to find the responsible person in case of a leakage☆1,063Updated 3 years ago
- Scanning APK file for URIs, endpoints & secrets.☆5,379Updated 4 months ago
- KeyDecoder app lets you use your smartphone or tablet to decode your mechanical keys in seconds.☆3,146Updated last year
- Indicators of Compromise from Amnesty International's cyber investigations☆1,611Updated 7 months ago
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,132Updated 9 months ago
- Pack up to 3MB of data into a tweetable PNG polyglot file.☆2,562Updated 3 years ago
- MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.☆11,389Updated last week
- jq for binary formats - tool, language and decoders for working with binary and text formats☆10,182Updated last week
- A self-hosted, ad-free, privacy-respecting metasearch engine☆10,878Updated last month
- A Chrome extension that will steal literally everything it can☆721Updated last year
- RedEye is a visual analytic tool supporting Red & Blue Team operations☆2,730Updated last year
- Captchas don't have to be boring☆1,044Updated 6 months ago
- ☆2,081Updated 3 years ago
- Web Attack Cheat Sheet☆4,311Updated last week
- Quickly discover exposed hosts on the internet using multiple search engines.☆2,644Updated last week
- ⚠️ Browser fingerprinting via favicon!☆4,694Updated 2 years ago
- Trojan Source: Invisible Vulnerabilities☆1,265Updated 2 years ago
- A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Boun…☆8,987Updated 3 weeks ago
- ☆1,041Updated 4 months ago
- a drop-in replacement for Nmap powered by shodan.io☆3,069Updated 2 months ago