Fadi002 / unshackleLinks
Open-source tool to bypass windows and linux passwords from bootable usb
☆1,958Updated last year
Alternatives and similar repositories for unshackle
Users that are interested in unshackle are comparing it to the libraries listed below
Sorting:
- Simple Windows and Linux keystroke injection tool that exfiltrates stored WiFi data (SSID and password).☆534Updated 3 months ago
- ☆1,002Updated last year
- Quickly Extracts IP's, Email Addresses, Hashes, Files, Credit Cards, Social Security Numbers and a lot More From Text☆871Updated last year
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,282Updated 3 months ago
- Interactively find and recover deleted or overwritten files from your terminal☆1,687Updated this week
- PoC to record audio from a Bluetooth device☆1,488Updated last year
- AutoPWN Suite is a project for scanning vulnerabilities and exploiting systems automatically.☆1,024Updated last week
- Ready to go Phishing Platform☆1,066Updated 5 months ago
- Simple C++ Image Steganography tool to encrypt and hide files inside images using Least-Significant-Bit encoding.☆1,052Updated last year
- Get IP address on other side audio call in Telegram.☆1,813Updated 2 years ago
- 🐀 Small chrome extension to monitor (and optionally block) other extensions' network calls☆2,286Updated 7 months ago
- Hide 🕵️♂️ your files of any type inside a image of your choice using steganography☆441Updated last year
- Xeno-RAT is an open-source remote access tool (RAT) developed in C#, providing a comprehensive set of features for remote system manageme…☆1,411Updated last year
- Wi-Fi Exploitation Framework☆2,614Updated last month
- An Open-source LTE Downlink/Uplink Eavesdropper☆2,052Updated last year
- NIVOS is a hacking tool that allows you to scan deeply , crack wifi, see people on your network. It applies to all linux operating system…☆447Updated last year
- This is Sherlock's sister, Modern shiny CLI tool written with Golang to help you: 🔎 Hunt down social media accounts by username across s…☆799Updated 8 months ago
- Sharing is a command-line tool to share directories and files from the CLI to iOS and Android devices without the need of an extra client…☆1,777Updated 2 years ago
- A Python Script exploiting a practical vulnerability in the Bolt E-Scooter app which makes it possible to use the E-Scooters without any …☆59Updated last year
- A collection of bookmarks for penetration testers, bug bounty hunters, malware developers, reverse engineers and anyone who is just inte…☆914Updated 2 years ago
- A simple command line tool using which you can skip phone number based SMS verification by using a temporary phone number that acts like …☆2,768Updated 2 years ago
- WiFi Penetration Testing & Auditing Tool☆589Updated 6 months ago
- A deauth attack that disconnects all devices from the target wifi network (2.4Ghz & 5Ghz)☆701Updated 7 months ago
- A small and efficent script to send SMS all over the world anonymously☆529Updated last month
- 🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard…☆1,680Updated 5 months ago
- Panthera(P.)uncia - Official CLI utility for Osprey Vision, Subdomain Center & Exploit Observer.☆661Updated 4 months ago
- Is Windows a joke or are you? 🧢☆249Updated 2 years ago
- Better privacy without special software☆1,729Updated last year
- Your target's phone's front and back cameras📸 can be accessed by sending a link🔗.☆1,008Updated 7 months ago
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,161Updated 3 weeks ago