Fadi002 / unshackleLinks
Open-source tool to bypass windows and linux passwords from bootable usb
☆1,916Updated last year
Alternatives and similar repositories for unshackle
Users that are interested in unshackle are comparing it to the libraries listed below
Sorting:
- ☆973Updated 10 months ago
- Simple Windows and Linux keystroke injection tool that exfiltrates stored WiFi data (SSID and password).☆430Updated last year
- A small and efficent script to send SMS all over the world anonymously☆508Updated last year
- 802.11 Attack Tool☆1,460Updated this week
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality…☆4,127Updated 2 weeks ago
- PoC to record audio from a Bluetooth device☆1,280Updated last year
- AutoPWN Suite is a project for scanning vulnerabilities and exploiting systems automatically.☆989Updated 9 months ago
- Quickly Extracts IP's, Email Addresses, Hashes, Files, Credit Cards, Social Security Numbers and a lot More From Text☆836Updated last year
- Wi-Fi Exploitation Framework☆2,545Updated 9 months ago
- Ready to go Phishing Platform☆975Updated last month
- A collection of bookmarks for penetration testers, bug bounty hunters, malware developers, reverse engineers and anyone who is just inte…☆912Updated last year
- Tunneling Internet traffic over Whatsapp☆2,284Updated 2 years ago
- A multiprotocol credentials bruteforcer / password sprayer and enumerator. 🥷☆1,596Updated 3 months ago
- Zehef is an osint tool to track emails☆800Updated 6 months ago
- An all-in-one hacking tool to remotely exploit Android devices using ADB and Metasploit-Framework to get a Meterpreter session.☆5,171Updated last year
- Generates millions of keyword-based password mutations in seconds.☆1,311Updated 9 months ago
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,253Updated 4 months ago
- Simple C++ Image Steganography tool to encrypt and hide files inside images using Least-Significant-Bit encoding.☆1,036Updated last year
- DetectDee: Hunt down social media accounts by username, email or phone across social networks.☆1,490Updated last year
- Automated WPA/WPA2 PSK attack tool.☆573Updated 3 years ago
- 🚀🚀 This is a 🎇🔥 REAL WORLD🔥 🎇 Malware Collection I have Compiled & analysed by researchers🔥 to understand more about Malware thre…☆1,065Updated last year
- USB Army Knife – the ultimate close access tool for penetration testers and red teamers.☆1,538Updated this week
- DarkGPT is an OSINT assistant based on GPT-4-200K (recommended use) designed to perform queries on leaked databases, thus providing an ar…☆26Updated 5 months ago
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,115Updated 7 months ago
- It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography …☆400Updated 2 years ago
- An Open-source LTE Downlink/Uplink Eavesdropper☆1,940Updated 7 months ago
- Powerful framework for rogue access point attack.☆2,190Updated last year
- OSINT tool for finding profiles by username☆2,373Updated last year
- I leverage OpenAI and ChatGPT to do hackerish things☆1,020Updated 7 months ago
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,083Updated 10 months ago