Fadi002 / unshackleLinks
Open-source tool to bypass windows and linux passwords from bootable usb
☆1,964Updated 2 years ago
Alternatives and similar repositories for unshackle
Users that are interested in unshackle are comparing it to the libraries listed below
Sorting:
- ☆1,021Updated 3 weeks ago
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,296Updated 5 months ago
- Quickly Extracts IP's, Email Addresses, Hashes, Files, Credit Cards, Social Security Numbers and a lot More From Text☆875Updated last year
- Simple Windows and Linux keystroke injection tool that exfiltrates stored WiFi data (SSID and password).☆544Updated 5 months ago
- Ready to go Phishing Platform☆1,085Updated 8 months ago
- AutoPWN Suite is a project for scanning vulnerabilities and exploiting systems automatically.☆1,038Updated last month
- Get IP address on other side audio call in Telegram.☆1,836Updated 2 years ago
- Hide 🕵️♂️ your files of any type inside a image of your choice using steganography☆444Updated last month
- ExifLooter finds geolocation on all image urls and directories also integrates with OpenStreetMap☆477Updated last year
- A small and efficent script to send SMS all over the world anonymously☆538Updated 3 months ago
- TUI-based toolkit for GitHub-data analysis.☆1,874Updated last week
- 🐀 Small chrome extension to monitor (and optionally block) other extensions' network calls☆2,310Updated 9 months ago
- PoC to record audio from a Bluetooth device☆1,538Updated last year
- Interactively find and recover deleted or overwritten files from your terminal☆1,722Updated this week
- 🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard…☆1,737Updated 8 months ago
- This is Sherlock's sister, Modern shiny CLI tool written with Golang to help you: 🔎 Hunt down social media accounts by username across s…☆813Updated 10 months ago
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,186Updated 3 months ago
- Your target's phone's front and back cameras📸 can be accessed by sending a link🔗.☆1,068Updated 9 months ago
- It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography …☆412Updated 3 years ago
- Simple C++ Image Steganography tool to encrypt and hide files inside images using Least-Significant-Bit encoding.☆1,057Updated last year
- DaProfiler is an OSINT tool allowing you to collect certain information about yourself in order to rectify by rgpd requests the traces yo…☆975Updated 2 years ago
- An all-in-one hacking tool to remotely exploit Android devices using ADB and Metasploit-Framework to get a Meterpreter session.☆5,514Updated last year
- NIVOS is a hacking tool that allows you to scan deeply , crack wifi, see people on your network. It applies to all linux operating system…☆454Updated last year
- A collection of bookmarks for penetration testers, bug bounty hunters, malware developers, reverse engineers and anyone who is just inte…☆913Updated 2 years ago
- AI-powered penetration testing assistant for automating recon, note-taking, and vulnerability analysis.☆831Updated last month
- Search WiFi geolocation data by BSSID and SSID on different public databases.☆1,127Updated last year
- Open Source Intelligence Interface for Deep Web Scraping☆1,453Updated last week
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality…☆4,300Updated 7 months ago
- Wi-Fi Exploitation Framework☆2,639Updated 3 months ago
- A Python Script exploiting a practical vulnerability in the Bolt E-Scooter app which makes it possible to use the E-Scooters without any …☆61Updated last year