BernKing / ChromeStealerLinks
ChromeStealer is a tool for educational purposes to demonstrate how to extract and decrypt stored passwords from Google Chrome on a Windows system using C/C++.
☆187Updated last year
Alternatives and similar repositories for ChromeStealer
Users that are interested in ChromeStealer are comparing it to the libraries listed below
Sorting:
- Linux-based botnet builder designed for creating advanced botnet payloads.☆104Updated 2 months ago
- ExeRay AI detects malicious Windows executables using ML. Analyzes entropy, imports, and metadata for rapid classification, aiding incide…☆59Updated 5 months ago
- Payload for jpg file☆64Updated last year
- File Hider is a sophisticated tool that allows you to securely hide and encrypt a file within another file using multiple layers of AES-2…☆142Updated last year
- Modern web-based distributed hashcracking solution, built on hashcat☆189Updated last week
- A high-performance Go-based tool for checking the availability and responsiveness of domains, utilizing both HTTP requests and browser au…☆92Updated last year
- Friendly graphical output of the nmap tool that allows filtering by open ports☆186Updated 3 years ago
- Repository contains a collection of scripts designed to demonstrate and exploit various vulnerabilities in HTTP and related protocols☆29Updated last month
- Light-weight web security scanner☆150Updated last month
- Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.☆276Updated last year
- Setezor is a network traffic analyzer with the ability to automatically build network topology☆178Updated last month
- A web service to clean documents from potentially privacy-invasive metadata☆50Updated 8 months ago
- Reverse proxies cheatsheet☆25Updated 2 years ago
- All in 1 phishing framework☆37Updated 3 years ago
- An OSINT tool tailored for comprehensive collection, analysis, and interpretation of cyber threat intelligence from Telegram channels and…☆104Updated last year
- A bash script for performing advanced Google dork searches to find files, names, usernames, emails, phone numbers, and images.☆29Updated last year
- Windows Defender Killer | C++ Code Disabling Permanently Windows Defender using Registry Keys☆499Updated 2 years ago
- A command line tool to encode text and files into PNG images☆199Updated 2 years ago
- Integrate LLM models directly into Ghidra for automated code rewrite and analysis.☆226Updated 3 weeks ago
- Cisco IOS Security Inspector☆40Updated last week
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup XSS Forum☆39Updated 5 months ago
- Hackings style defence tricks☆56Updated last week
- ☆20Updated 3 months ago
- The DNA test for websites☆75Updated last month
- ☆166Updated last year
- A monster cheatsheet on MITM attacks☆367Updated 7 months ago
- ⚔️ A command-line tool for IP address and URL obfuscation/de-obfuscation, providing diverse techniques for enhanced privacy and security.☆27Updated 8 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆128Updated 9 months ago
- A comprehensive Python-based security tool for file scanning, malware detection, and analysis in an ever-evolving cyber landscape.☆111Updated 2 years ago
- Сборная солянка по разным направлениям в ИБ!☆60Updated 3 weeks ago