CCob / gookiesLinks
A Chrome cookie dumping utility
☆46Updated 5 years ago
Alternatives and similar repositories for gookies
Users that are interested in gookies are comparing it to the libraries listed below
Sorting:
- A Microsoft windows x86_64 Golang shellcode tester that includes example calc.exe shellcode.☆69Updated 7 years ago
- Red Team C2 and Post Exploitation code☆36Updated this week
- A cross-platform C2/teamserver supporting multiple transport protocols, written in Go.☆45Updated 2 years ago
- Shellcode process injector☆28Updated 5 years ago
- Windows API/constants, identity, and WinHTTP/WinINet for Go.☆18Updated 3 weeks ago
- Reflectively load PE☆103Updated 4 years ago
- donLoader is a shellcode loader creation tool that uses donut to convert executable payloads into shellcode to evade detection on disk.☆20Updated 3 years ago
- I used this to see if an EDR is running in Safe Mode☆37Updated 4 years ago
- Golang Implant & Post-Exploitation Framework☆59Updated 2 years ago
- ☆27Updated 4 years ago
- Are you forwarding DNS traffic to another server for some reason, but want to make sure only queries for certain names are passed? Say no…☆21Updated 2 years ago
- LoadLibrary for offensive operations☆33Updated 3 years ago
- Extension of SMBLibrary for RPC calls☆35Updated last year
- A script that can be deployed to Azure App for C2 / Proxy / Redirector☆37Updated 6 years ago
- A Powershell module including a couple of cmdlets for EWS Enum/Exploitation.☆17Updated 5 years ago
- Credential Dumper☆77Updated 5 years ago
- Utility for hunting UAC bypasses or COM/DLL hijacks that alerts on the exported function that was consumed.☆41Updated 2 years ago
- CobaltStrike AggressorScripts for the lazy☆10Updated 2 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Updated 5 years ago
- PoC Remote Administration Tool☆11Updated 5 years ago
- A repo to hold any bypasses I work on/study/whatever☆19Updated 4 years ago
- ☆33Updated 4 years ago
- Initial Commit of Coresploit☆56Updated 3 years ago
- External C2 Using IE COM Objects☆100Updated 6 years ago
- reverse socks tunneler with ntlm and proxy support☆57Updated 2 years ago
- L3 proxy backed by Shadowsocks☆10Updated 2 years ago
- post exploitation user monitoring tool☆20Updated 7 years ago
- adding a backdooruser using win32api☆80Updated 4 years ago
- A C# tool to send emails through Outlook from the command line or in memory☆31Updated 5 years ago
- Suite of Shellcode Running Utilities☆111Updated 5 years ago