elmoiv / unoffice
Tiny read-only unlocker for MS Office documents
☆13Updated 3 years ago
Alternatives and similar repositories for unoffice:
Users that are interested in unoffice are comparing it to the libraries listed below
- Python program that denies internet access to a target within a local network...☆24Updated 3 years ago
- This tool is for download video/videos from tiktok.☆10Updated 3 years ago
- Full ArchStrike Installer for the ArchStrike ISO☆9Updated 3 years ago
- Inject Metasploit Shell Code in Legitimate Process☆11Updated 4 years ago
- Bash script to crack rdp with THC-Hydra☆16Updated 3 years ago
- Discord Scripts☆12Updated 5 years ago
- Monitoring Registry and File Changes in Windows☆71Updated 8 months ago
- Captive Portal Attack Tool☆8Updated 4 years ago
- A program to steal user information through a simple link☆13Updated last year
- ☆10Updated 4 years ago
- BurpDroid is a web application debugging tool for Android and is often used for checking web application security. It’s a proxy-based too…☆10Updated 3 years ago
- steal password mozilla firefox ,windows,Linux☆12Updated 4 years ago
- Finder Predator The Thief botnet panel☆7Updated 5 years ago
- Login to your accounts and grab your folder/file names to txt☆11Updated 4 years ago
- Bing Dork Scanner and simple sqli-injection checker☆16Updated 6 years ago
- Web testing application.☆15Updated 6 months ago
- Face-recognition using python 2+ opencv☆7Updated 6 years ago
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆12Updated 2 years ago
- ViperVenom is an open-source cyber offensive tool developed by Itay Funes for pentesters. ViperVenom is a great tool when it comes to pen…☆14Updated 3 years ago
- KeplerPulse is a tool that generates a Powershell command that once executed on a Machine, Downloads and executes your desired Executable…☆10Updated 3 years ago
- Convert batch script to executable with advanced obfuscator. Based on Batch-Obfuscator bat2exe very advanced and very well made.☆13Updated 3 years ago
- Modern Javascript keylogger with web panel☆22Updated 4 years ago
- Generate word list by combining inputted words or by permutaing characters.☆13Updated 7 years ago
- Automated encryption utilities and installation☆12Updated 4 years ago
- New continually changing MAC spoofer concept to thwart trackers; randomizes mac address at random times) prevents WIFI access point locat…☆18Updated 3 years ago
- NooB PyThon Matasploit Av Bypasser By Ali khan☆8Updated 4 years ago
- Facebook phishing page☆10Updated 4 years ago
- Spider or repeater to find all links.☆13Updated 4 years ago
- Automated F5 Big IP Remote Code Execution (CVE-2020-5902) Scanner Written In Python 3☆13Updated 3 years ago
- Compress pictures using tinypng.com without API token☆8Updated 2 years ago