Fadi002 / unshackleLinks
Open-source tool to bypass windows and linux passwords from bootable usb
☆1,926Updated last year
Alternatives and similar repositories for unshackle
Users that are interested in unshackle are comparing it to the libraries listed below
Sorting:
- Simple Windows and Linux keystroke injection tool that exfiltrates stored WiFi data (SSID and password).☆431Updated last year
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,088Updated 11 months ago
- Interactively find and recover deleted or overwritten files from your terminal☆1,502Updated last week
- ☆977Updated 10 months ago
- I leverage OpenAI and ChatGPT to do hackerish things☆1,039Updated 8 months ago
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,123Updated 8 months ago
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality…☆4,141Updated last month
- This python program gets all the saved passwords, credit cards and bookmarks from chromium based browsers supports chromium 80 and above!☆429Updated 11 months ago
- Wi-Fi Exploitation Framework☆2,561Updated last week
- Simple C++ Image Steganography tool to encrypt and hide files inside images using Least-Significant-Bit encoding.☆1,041Updated last year
- An Open-source LTE Downlink/Uplink Eavesdropper☆1,951Updated 8 months ago
- Quickly Extracts IP's, Email Addresses, Hashes, Files, Credit Cards, Social Security Numbers and a lot More From Text☆840Updated last year
- QR designer web app with a novel method of designing qr codes that does not take advantage of error correction☆2,726Updated 2 years ago
- Xeno-RAT is an open-source remote access tool (RAT) developed in C#, providing a comprehensive set of features for remote system manageme…☆1,297Updated last year
- Ready to go Phishing Platform☆991Updated last month
- 🐀 Small chrome extension to monitor (and optionally block) other extensions' network calls☆2,257Updated 3 months ago
- Hide 🕵️♂️ your files of any type inside a image of your choice using steganography☆436Updated last year
- 802.11 Attack Tool☆1,484Updated this week
- The Deepfake Offensive Toolkit☆4,349Updated last year
- GitHub Data Analysis Framework.☆1,856Updated last year
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,262Updated 5 months ago
- A collaboratively curated list of awesome Open-Source Intelligence (OSINT) Resources☆2,147Updated last month
- A collection of bookmarks for penetration testers, bug bounty hunters, malware developers, reverse engineers and anyone who is just inte…☆912Updated last year
- Powerful framework for rogue access point attack.☆2,205Updated last year
- It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography …☆400Updated 3 years ago
- RomBuster is a router exploitation tool that allows to disclosure network router admin password.☆511Updated 11 months ago
- PoC to record audio from a Bluetooth device☆1,334Updated last year
- Extract files from any kind of container formats☆2,327Updated this week
- Is Windows a joke or are you? 🧢☆255Updated 2 years ago
- Automated WPA/WPA2 PSK attack tool.☆576Updated 3 years ago