BinaryBeast007 / browser-password-decryptorLinks
A tool designed to extract and decrypt saved passwords from popular web browsers
☆19Updated 2 years ago
Alternatives and similar repositories for browser-password-decryptor
Users that are interested in browser-password-decryptor are comparing it to the libraries listed below
Sorting:
- Write-ups and proof of concepts of design and implementaion of various modern malwares.☆29Updated 2 years ago
- Cybersecurity research results. Simple C/C++ and Python implementations☆290Updated last week
- ☆129Updated last year
- My collection of malware dev links☆308Updated last week
- A runtime Crypter written in C++ to bypass AVs signature based detection☆39Updated 2 years ago
- A curated compilation of extensive resources dedicated to bootkit and rootkit development.☆177Updated 6 months ago
- Process hollowing C# shellcode runner that is FUD against Microsoft Defender as of October 7, 2023.☆24Updated 2 years ago
- Full source of the Conti Ransomware Including the missing Locker files from the original leak. I have fixed some of the errors intentiona…☆167Updated 2 years ago
- Pequeña guia que hice sobre el desarrollo de malware y tecnicas que son usadas☆28Updated 11 months ago
- This repo contains : simple shellcode Loader , Encoders (base64 - custom - UUID - IPv4 - MAC), Encryptors (AES), Fileless Loader (Winhttp…☆437Updated 2 years ago
- Shellcode Loader Library.☆14Updated 4 months ago
- PDF dropper Red Team Scenairos☆230Updated last year
- Inject DLLs into the explorer process using icons☆403Updated 8 months ago
- The following two code samples can be used to understand the difference between direct syscalls and indirect syscalls☆225Updated 2 years ago
- C++ self-Injecting dropper based on various EDR evasion techniques.☆425Updated last year
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆217Updated 3 months ago
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.☆12Updated last year
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆99Updated 11 months ago
- Malware Development for Ethical Hackers, published by Packt☆438Updated last week
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆432Updated 8 months ago
- RunPE implementation with multiple evasive techniques (1)☆381Updated 2 years ago
- Tool to evade Antivirus With Different Techniques☆192Updated 2 years ago
- ☆391Updated 7 months ago
- An advanced Ransomware written in C++ and fully customizable☆95Updated 2 years ago
- It bridges my research with a functional tool. I want to provide a safe, open-source framework for hackers to test evasion and for defend…☆281Updated 2 weeks ago
- A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfve…☆591Updated last year
- Performing Indirect Clean Syscalls☆603Updated 2 years ago
- Embed a payload inside a PNG file☆368Updated last year
- Analyse your malware to surgically obfuscate it☆517Updated last month
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆766Updated 2 weeks ago