zvyn / pdf-decryptLinks
Remove password-protection from a PDF-document permanently.
☆50Updated 6 years ago
Alternatives and similar repositories for pdf-decrypt
Users that are interested in pdf-decrypt are comparing it to the libraries listed below
Sorting:
- ☆27Updated 4 years ago
- list of all the pastebins across all protocols (Tor, ZeroNet, etc.)☆42Updated 5 years ago
- Private and self-hosted file sharing over the Tor network written in golang☆119Updated 4 months ago
- Collection of CVEs from Sick Codes, or collaborations on https://sick.codes security research & advisories.☆89Updated 3 years ago
- Fake Seeder for Torrent☆12Updated 5 years ago
- ADB Download All Files - A dirty shell script to adb pull all readable files using adb pull & base64☆25Updated 4 years ago
- transparent TCP-to-proxy redirector☆16Updated 5 years ago
- Search for potential emails from your target in Github's public events☆16Updated 4 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆36Updated 4 years ago
- Python program that denies internet access to a target within a local network...☆23Updated 4 years ago
- 🛰A bash script to check if you have a gateway that could get you somewhere nice.☆15Updated 5 years ago
- List of NSO Pegasus's C2C Servers where will be used to control Pegasus.☆18Updated 2 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Updated 4 years ago
- Docker environment for hackers☆17Updated 5 years ago
- Monitoring Registry and File Changes in Windows☆70Updated last year
- Lookup phone numbers’ carriers by screen-scraping FreeCarrierLookup.com☆20Updated 3 weeks ago
- Generates several passwords based on one single word, like a company's name.☆26Updated 3 years ago
- Check if your provider is blocking you!☆105Updated 3 years ago
- Open source platform for covert data exfiltration operations, supporting all device types: computers, servers, mobile phones, tablets, pe…☆46Updated 3 years ago
- A collection of samples for development and testing of John the Ripper and other password security auditing and password recovery tools☆39Updated 3 months ago
- Configures your Raspberry Pi as portable WiFi-WiFi Tor proxy.☆21Updated 5 years ago
- USBNinja Android Remote Control Application☆30Updated 6 years ago
- Scapy: the Python-based interactive packet manipulation program & library. Supports Python 2 & Python 3.☆30Updated 4 years ago
- Create Containerized Clearnet Proxies☆31Updated 6 years ago
- The (new) discovery backend for https://odcrawler.xyz☆34Updated 2 years ago
- Anonymous HTTP proxy that forwards all requests through one or multiple proxy servers, with a proxy servers auto-discovery☆23Updated 5 years ago
- konboot iso and Sticky key backddoor.☆23Updated 6 years ago
- A Reverse Incremental Backup Script for RClone with support for Windows/Linux/Mac with Volume Shadow Copy (VSS) and email report.☆12Updated 5 years ago
- Resource Dump For Learning Cybersec-related Concepts☆25Updated 5 years ago
- Browser agnostic extension that enables pasting into password fields...☆15Updated 5 years ago