BernKing / ChromeStealerLinks
ChromeStealer is a tool for educational purposes to demonstrate how to extract and decrypt stored passwords from Google Chrome on a Windows system using C/C++.
☆150Updated 10 months ago
Alternatives and similar repositories for ChromeStealer
Users that are interested in ChromeStealer are comparing it to the libraries listed below
Sorting:
- Linux-based botnet builder designed for creating advanced botnet payloads.☆87Updated last week
- Modern web-based distributed hashcracking solution, built on hashcat☆138Updated 2 weeks ago
- Payload for jpg file☆64Updated 9 months ago
- Repository contains a collection of scripts designed to demonstrate and exploit various vulnerabilities in HTTP and related protocols☆20Updated last month
- A high-performance Go-based tool for checking the availability and responsiveness of domains, utilizing both HTTP requests and browser au…☆88Updated 6 months ago
- An OSINT tool tailored for comprehensive collection, analysis, and interpretation of cyber threat intelligence from Telegram channels and…☆92Updated last year
- File Hider is a sophisticated tool that allows you to securely hide and encrypt a file within another file using multiple layers of AES-2…☆127Updated last year
- Friendly graphical output of the nmap tool that allows filtering by open ports☆182Updated 2 years ago
- All in 1 phishing framework☆37Updated 2 years ago
- FaceDancer is an exploitation tool aimed at creating hijackable, proxy-based DLLs by taking advantage of COM-based system DLL image loadi…☆302Updated 8 months ago
- Setezor is a network traffic analyzer with the ability to automatically build network topology☆147Updated 2 weeks ago
- Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.☆272Updated 11 months ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆388Updated 8 months ago
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆129Updated 4 months ago
- Windows Defender Killer | C++ Code Disabling Permanently Windows Defender using Registry Keys☆460Updated last year
- A web service to clean documents from potentially privacy-invasive metadata☆51Updated last month
- A collection of all my personal cheat sheets and guides as I progress through my career in offensive security.☆203Updated 4 months ago
- 🔬Collection of malware, ransomware, RATs, botnets, stealers, etc.☆195Updated 3 years ago
- A bash script for performing advanced Google dork searches to find files, names, usernames, emails, phone numbers, and images.☆25Updated 11 months ago
- ☆95Updated last year
- A command line tool to encode text and files into PNG images☆177Updated last year
- Reverse Shell - technique is commonly used in cyber attacks☆16Updated last year
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆190Updated 2 months ago
- Cisco IOS Security Inspector☆31Updated 2 months ago
- A comprehensive Python-based security tool for file scanning, malware detection, and analysis in an ever-evolving cyber landscape.☆109Updated last year
- Light-weight web security scanner☆150Updated 2 months ago
- FreeThinker is an AI agent that uses free-of-charge API open source LLMs in order to automatize tasks. That meaning that you don't requir…☆70Updated 8 months ago
- ☆322Updated 2 months ago
- Reverse proxies cheatsheet☆20Updated last year
- A Rust implementation of GodPotato — abusing SeImpersonate to gain SYSTEM privileges. Includes a TCP-based reverse shell and indirect NTA…☆287Updated last month