A Chrome cookie dumping utility
☆46Feb 21, 2020Updated 6 years ago
Alternatives and similar repositories for gookies
Users that are interested in gookies are comparing it to the libraries listed below
Sorting:
- Chrome cookie dumper☆18Jan 27, 2021Updated 5 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆20Aug 29, 2022Updated 3 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆19Nov 20, 2020Updated 5 years ago
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆12Jun 21, 2021Updated 4 years ago
- Userland API Unhooker Project☆111Jun 14, 2021Updated 4 years ago
- Import Nmap scans to Cherrytree☆36Jul 4, 2022Updated 3 years ago
- Solution for Ricardo Narvaja's C++ Exploiting Exercise☆12Jul 21, 2019Updated 6 years ago
- Inject .Net payloads into other .Net assemblies on disk☆61Dec 12, 2019Updated 6 years ago
- Library of traffic redirectors☆26Apr 7, 2020Updated 5 years ago
- A Powershell module including a couple of cmdlets for EWS Enum/Exploitation.☆17Aug 6, 2019Updated 6 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Apr 6, 2024Updated last year
- Cobalt Strike Aggressor script menu for Powerview/SharpView☆28May 8, 2019Updated 6 years ago
- wordlists for password cracking☆29Aug 15, 2022Updated 3 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆22Sep 27, 2020Updated 5 years ago
- Identify common attack paths to get Domain Administrator☆21Aug 20, 2019Updated 6 years ago
- ReaCOM has got a lot of tools to use and is related to component object model☆74Feb 3, 2020Updated 6 years ago
- ☆37Apr 30, 2020Updated 5 years ago
- A Cobalt Strike Aggressor script to generate GadgetToJScript payloads☆101Sep 30, 2020Updated 5 years ago
- ☆24Sep 26, 2021Updated 4 years ago
- Credential Dumper☆79Feb 19, 2020Updated 6 years ago
- Bare template for a Kernel Mode Driver☆51Mar 10, 2020Updated 5 years ago
- ☆181Feb 3, 2021Updated 5 years ago
- Go library for credentials recovery☆224Sep 7, 2022Updated 3 years ago
- ☆58Aug 31, 2018Updated 7 years ago
- Windows PE - TLS (Thread Local Storage) Injector in C/C++☆109Jan 3, 2021Updated 5 years ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- Simple tool to use LsaManageSidNameMapping get LSA to add or remove SID to name mappings.☆26Oct 25, 2020Updated 5 years ago
- Post-exploitation tool☆26Mar 7, 2021Updated 4 years ago
- A Bind Shell Using the Fax Service and a DLL Hijack☆332May 3, 2020Updated 5 years ago
- PoC to demonstrate how CLR ETW events can be tampered.☆192Mar 26, 2020Updated 5 years ago
- Project to check which Nt/Zw functions your local EDR is hooking☆200Mar 21, 2021Updated 4 years ago
- Detect possible sysmon logging bypasses given a specific configuration☆111Dec 26, 2018Updated 7 years ago
- A C# tool to send emails through Outlook from the command line or in memory☆32Jun 17, 2020Updated 5 years ago
- If you have any questions, please open an issue.☆25Apr 6, 2022Updated 3 years ago
- proper ntdll .text section unhooking via native api. unlike other unhookers this doesnt leave 2 ntdlls loaded. x86/x64/wow64 supported.☆53Dec 9, 2025Updated 2 months ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆10Jun 3, 2017Updated 8 years ago
- Sound Research SECOMN service Privilege Escalation (windows 10)☆39Mar 17, 2020Updated 5 years ago
- A simple python tool based on Impacket that tests servers for various known NTLM vulnerabilities☆205Nov 8, 2020Updated 5 years ago