BishopFox / unredacterLinks
Never ever ever use pixelation as a redaction technique
☆8,157Updated last year
Alternatives and similar repositories for unredacter
Users that are interested in unredacter are comparing it to the libraries listed below
Sorting:
- Depix is a PoC for a technique to recover plaintext from pixelized screenshots.☆2,790Updated 7 months ago
- ⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡☆20,195Updated 8 months ago
- Answering the question nobody asked: what if you wanted to text your friends using only ARP?☆2,544Updated 2 years ago
- Tunneling Internet traffic over Whatsapp☆3,045Updated 3 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,470Updated 3 years ago
- a drop-in replacement for Nmap powered by shodan.io☆3,141Updated 6 months ago
- The Deepfake Offensive Toolkit☆4,463Updated last year
- Browser In The Browser (BITB) Templates☆2,857Updated last year
- OFRAK: unpack, modify, and repack binaries.☆1,994Updated last week
- Crack legacy zip encryption with Biham and Kocher's known plaintext attack.☆2,015Updated 2 weeks ago
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock☆7,064Updated last year
- 🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell …☆7,093Updated 2 years ago
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,168Updated last month
- 🎤⌨️ Acoustic keyboard eavesdropping☆8,932Updated 2 years ago
- Hash collisions and exploitations☆3,292Updated 9 months ago
- 🕵️♂️ Collect a dossier on a person by username from thousands of sites☆17,987Updated this week
- An open-source digital image forensic toolset☆3,046Updated 4 months ago
- Craft PNG files that appear completely different in Apple software [NOW PATCHED]☆1,063Updated 3 years ago
- KeyDecoder app lets you use your smartphone or tablet to decode your mechanical keys in seconds.☆3,156Updated last year
- A fast, simple, recursive content discovery tool written in Rust.☆7,224Updated last week
- A collection of all the data i could extract from 1 billion leaked credentials from internet.☆3,197Updated 5 years ago
- Recovers pixelized text from images☆219Updated 3 years ago
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,389Updated 8 months ago
- Trojan Source: Invisible Vulnerabilities☆1,272Updated 2 years ago
- Scanning APK file for URIs, endpoints & secrets.☆5,721Updated 3 months ago
- Real-time HTTP Intrusion Detection☆3,075Updated last year
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,612Updated 8 months ago
- The all-in-one browser extension for offensive security professionals 🛠☆6,433Updated 10 months ago
- SSH-MITM - ssh audits made simple☆1,418Updated 2 weeks ago
- Makes reverse engineering Android apps easier, automating repetitive tasks like pulling, decoding, rebuilding and patching an APK.☆3,631Updated 6 months ago