BernKing / ChromeStealer
ChromeStealer is a tool for educational purposes to demonstrate how to extract and decrypt stored passwords from Google Chrome on a Windows system using C/C++.
☆49Updated 3 months ago
Related projects ⓘ
Alternatives and complementary repositories for ChromeStealer
- Modern web-based distributed hashcracking solution, built on hashcat☆114Updated 3 weeks ago
- A web service to clean documents from potentially privacy-invasive metadata☆50Updated 8 months ago
- File Hider is a sophisticated tool that allows you to securely hide and encrypt a file within another file using multiple layers of AES-2…☆115Updated 10 months ago
- All in 1 phishing framework☆28Updated 2 years ago
- Payload for jpg file☆58Updated 3 months ago
- FaceDancer is an exploitation tool aimed at creating hijackable, proxy-based DLLs by taking advantage of COM-based system DLL image loadi…☆207Updated last month
- hiding in plain sight: part 2☆46Updated 4 months ago
- Reverse Shell - technique is commonly used in cyber attacks☆15Updated 8 months ago
- A collection of all my personal cheat sheets and guides as I progress through my career in offensive security.☆81Updated 3 weeks ago
- Analyse MSI files for vulnerabilities☆109Updated 2 months ago
- ☆56Updated last year
- Friendly graphical output of the nmap tool that allows filtering by open ports☆136Updated 2 years ago
- GitHub CVE Repository Hunt☆16Updated 3 months ago
- PowerShell script to generate ShellCode in various formats☆39Updated last month
- Payload encoding utility to effectively lower payload entropy.☆99Updated this week
- RegStrike is a .reg payload generator☆57Updated last year
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆62Updated 2 months ago
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆26Updated 2 months ago
- Another Hardening Windows Tool☆50Updated 3 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆43Updated last year
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆40Updated 11 months ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆285Updated last month
- A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders Stardust☆82Updated 7 months ago
- RCE PoC for Empire C2 framework <5.9.3☆26Updated 8 months ago
- Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.☆231Updated 5 months ago
- The DNA test for websites☆49Updated last week
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated 3 months ago
- AntiRansomware Linux Kernel Module☆37Updated last year
- VLAN ID Parser☆5Updated 6 months ago