Open-source tool to bypass windows and linux passwords from bootable usb
☆1,974Nov 10, 2023Updated 2 years ago
Alternatives and similar repositories for unshackle
Users that are interested in unshackle are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Management of multiple Git SSH keys made easy☆251Mar 19, 2026Updated last week
- Deobfuscator for : https://github.com/Blank-c/BlankOBF☆14Aug 21, 2023Updated 2 years ago
- The ultimate AI-powered toolkit for python reverse engineering☆968Mar 21, 2026Updated last week
- An all-in-one hacking tool to remotely exploit Android devices using ADB and Metasploit-Framework to get a Meterpreter session.☆5,681Mar 21, 2026Updated last week
- Light-weight web security scanner☆149Nov 22, 2025Updated 4 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Boun…☆10,352Mar 21, 2026Updated last week
- Good python obfuscator☆11Aug 20, 2022Updated 3 years ago
- Homemade Pwnbox / Rogue AP based on Raspberry Pi — WiFi Hacking Cheatsheets + MindMap☆2,000Mar 13, 2024Updated 2 years ago
- just a tool to find informations about any website☆14Aug 20, 2022Updated 3 years ago
- 🕵️♂️ All-in-one OSINT tool for analysing any website☆32,529Jan 31, 2026Updated last month
- Simple Windows and Linux keystroke injection tool that exfiltrates stored WiFi data (SSID and password).☆566Jul 26, 2025Updated 8 months ago
- Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.☆2,717Apr 20, 2024Updated last year
- ☆153Jun 8, 2025Updated 9 months ago
- The recursive internet scanner for hackers. 🧡☆9,538Updated this week
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Browser Protector against various stealers, written in C# & C/C++.☆220Feb 20, 2025Updated last year
- This Script will help you to gather information about your victim or friend.☆1,462Sep 10, 2025Updated 6 months ago
- Windows Defender Killer | C++ Code Disabling Permanently Windows Defender using Registry Keys☆499Jul 27, 2023Updated 2 years ago
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,316Updated this week
- ADB-Toolkit V2 for easy ADB tricks with many perks in all one. ENJOY!☆1,956Aug 18, 2024Updated last year
- Tools and Techniques for Red Team / Penetration Testing☆8,608Mar 18, 2025Updated last year
- Introducing "URL Making Technology" to the world for the very FIRST TIME. Give a Mask to Phishing URL like a PRO.. A MUST have tool for P…☆3,054Sep 16, 2025Updated 6 months ago
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality…☆4,358May 21, 2025Updated 10 months ago
- Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.☆3,304Nov 1, 2025Updated 4 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆11,108Mar 17, 2024Updated 2 years ago
- Quickly Extracts IP's, Email Addresses, Hashes, Files, Credit Cards, Social Security Numbers and a lot More From Text☆883Feb 28, 2024Updated 2 years ago
- DDos Ripper a Distributable Denied-of-Service (DDOS) attack server that cuts off targets or surrounding infrastructure in a flood of Inte…☆2,742Mar 10, 2026Updated 2 weeks ago
- Get admin on any windows computer in about 30 seconds☆28May 3, 2024Updated last year
- ☆568Mar 28, 2024Updated 2 years ago
- Comfortably monitor your Internet traffic 🕵️♂️☆33,061Mar 21, 2026Updated last week
- Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Management☆4,990Updated this week
- Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.☆276Jun 16, 2024Updated last year
- ⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡☆21,276Mar 5, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- 🕵️♂️ Collect a dossier on a person by username from 3000+ sites☆19,301Updated this week
- The Official USB Rubber Ducky Payload Repository☆5,617Mar 20, 2026Updated last week
- ALL IN ONE Hacking Tool For Hackers☆55,457Mar 15, 2026Updated 2 weeks ago
- A collection of several hundred online tools for OSINT☆7,693Jul 16, 2025Updated 8 months ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆116Jul 18, 2023Updated 2 years ago
- A nice tool to get all discord token info☆13Apr 18, 2023Updated 2 years ago
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️☆6,442Mar 16, 2026Updated 2 weeks ago