A Chrome cookie dumping utility
☆46Feb 21, 2020Updated 6 years ago
Alternatives and similar repositories for gookies
Users that are interested in gookies are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Chrome cookie dumper☆18Jan 27, 2021Updated 5 years ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆20Aug 29, 2022Updated 3 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- Converts JBoss/Wildfly management users properties file to hashcat format compatible with mode 20☆12Apr 26, 2020Updated 5 years ago
- Smart Card PIN swiping DLL☆78Oct 4, 2020Updated 5 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Exploit PoC for CVE's and non CVE's alike☆22Jul 24, 2020Updated 5 years ago
- Import Nmap scans to Cherrytree☆36Jul 4, 2022Updated 3 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆19Nov 20, 2020Updated 5 years ago
- Userland API Unhooker Project☆111Jun 14, 2021Updated 4 years ago
- Some security by obscurity using port-jumping.☆14Aug 21, 2025Updated 7 months ago
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆12Jun 21, 2021Updated 4 years ago
- This is a group of tools that I was planning on releasing During Derbycon 2019 talk if it was accepted or with a blogpost if not.☆43Jun 19, 2021Updated 4 years ago
- Inject .Net payloads into other .Net assemblies on disk☆61Dec 12, 2019Updated 6 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆10Jun 3, 2017Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Identify common attack paths to get Domain Administrator☆21Aug 20, 2019Updated 6 years ago
- Repository to gather the BOF files I will be developing☆11Oct 1, 2024Updated last year
- UglyEXe - bypass some AVs☆17Feb 28, 2020Updated 6 years ago
- ReaCOM has got a lot of tools to use and is related to component object model☆74Feb 3, 2020Updated 6 years ago
- A Powershell module including a couple of cmdlets for EWS Enum/Exploitation.☆19Aug 6, 2019Updated 6 years ago
- ☆181Feb 3, 2021Updated 5 years ago
- Strstr with user-supplied needle and filename as a BOF.☆32Sep 27, 2021Updated 4 years ago
- Source code in Win32 ASM and C for a shellcode execution wrapper designed to mitigate the risk of shellcode execution on a host other tha…☆19Apr 30, 2016Updated 9 years ago
- Tool aided persistence via Windows URI schemes abuse☆84Mar 1, 2020Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Covenant is a collaborative .NET C2 framework for red teamers.☆22Sep 27, 2020Updated 5 years ago
- Cobalt Strike Aggressor script menu for Powerview/SharpView☆28May 8, 2019Updated 6 years ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- Credential Dumper☆79Feb 19, 2020Updated 6 years ago
- A tool for harvesting sysadmin credentials in Linux☆19Jul 10, 2024Updated last year
- A tool for leveraging elevated acess over a computer to boot the computer into Windows Safe Mode, alter settings, and then boot back into…☆16Nov 6, 2021Updated 4 years ago
- If you have any questions, please open an issue.☆25Apr 6, 2022Updated 3 years ago
- Go library for credentials recovery☆224Sep 7, 2022Updated 3 years ago
- a simple reverse connected bot in golang.☆17Jun 14, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Really stupid re-implementation of invoke-wmiexec☆217Feb 25, 2023Updated 3 years ago
- A Bind Shell Using the Fax Service and a DLL Hijack☆332May 3, 2020Updated 5 years ago
- wordlists for password cracking☆29Aug 15, 2022Updated 3 years ago
- ☆16Apr 14, 2020Updated 5 years ago
- Reflective DLL loading of your favorite Golang program☆173Jan 27, 2020Updated 6 years ago
- Solution for Ricardo Narvaja's C++ Exploiting Exercise☆12Jul 21, 2019Updated 6 years ago
- Go implementation of the Heaven's Gate technique☆102Feb 11, 2021Updated 5 years ago