Python script that will extract all saved passwords from your google chrome database on windows only
☆85Sep 30, 2020Updated 5 years ago
Alternatives and similar repositories for Chrome-Extractor
Users that are interested in Chrome-Extractor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Share wifi on windows with arranged password like every hour or every day☆15Feb 4, 2017Updated 9 years ago
- Basic python script for detect airdroid users in lan☆49Sep 30, 2020Updated 5 years ago
- A lookup tool created to explore the NJ Arrest file from the FBI. Created for Hack Jersey 2.0☆14Apr 1, 2015Updated 11 years ago
- A python3 script that uses cl1p website to send and receive secret messages☆31Oct 1, 2020Updated 5 years ago
- Python backdoor that uses http post/get requests to communicate☆43Aug 24, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Exploit XXE Out-Of-Band Vulnerability Easily☆16Jul 28, 2016Updated 9 years ago
- Random scripts I write to automate non-hacking stuff☆23Mar 24, 2019Updated 7 years ago
- Provides metadata extraction for iOS, Android and Windows packages.☆38Apr 19, 2023Updated 3 years ago
- Dump the saved wifi passwords for windows using regular expressions and python 3☆18Dec 22, 2016Updated 9 years ago
- Fast subdomains enumeration tool for penetration testers☆13Jan 31, 2017Updated 9 years ago
- Kill Any Antivirus Using Python For Windows Users .☆45Aug 3, 2016Updated 9 years ago
- Create Basic SSH Honeypot With Python☆29Jul 11, 2016Updated 9 years ago
- A python tool that will extract exif data from picture with two methods☆41Jan 1, 2022Updated 4 years ago
- QRLJacking or Quick Response Code Login Jacking is a simple-but-nasty attack vector affecting all the applications that relays on “Login…☆13Sep 27, 2016Updated 9 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Search for leaked creadentials on pwndb using the command line and tor.☆25Jan 31, 2019Updated 7 years ago
- A simple python script to grab twitter account info just by username or profile link☆53Mar 3, 2017Updated 9 years ago
- A python keylogger that does more than any other keylogger - Key logger, Clicks logger and Screenshots☆499Oct 14, 2024Updated last year
- some python3 functions to add spreading features to any python backdoor☆55Jan 22, 2017Updated 9 years ago
- A host-based IDS and network monitoring system (My graduation project)☆27Jul 6, 2021Updated 4 years ago
- An Open Source Mobile Forensics Investigation Tool for Android Platform☆119Feb 21, 2018Updated 8 years ago
- IP obfuscator made to make a malicious ip a bit cuter☆548Oct 14, 2024Updated last year
- A python script designed to check if the website if vulnerable of clickjacking and create a poc☆157Sep 5, 2020Updated 5 years ago
- A python script designed to grab the original url from an adfly url without opening it :D☆56Mar 3, 2017Updated 9 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Python virus that will make your pc paralyzed once it opened :D☆49Jul 20, 2021Updated 4 years ago
- A http flood python script that could stop a normal website in 10s☆402Jun 16, 2021Updated 4 years ago
- A collection of tools I wrote for bug bounty or hacking and don't mind publishing it☆124Oct 14, 2024Updated last year
- Track users across social media platform☆167Jan 26, 2021Updated 5 years ago
- Mail extractor with your dork☆22Jan 27, 2021Updated 5 years ago
- Concurrently test bing results for shellshock vulnerability☆42Sep 27, 2014Updated 11 years ago
- This program show you IMSI numbers of cellphones around you.☆13Dec 14, 2017Updated 8 years ago
- Know the dangers of credential reuse attacks.☆2,103Dec 9, 2025Updated 4 months ago
- Sniffs an interface/pcap file and concatenates fragmented packet loads☆22Feb 26, 2015Updated 11 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- SwaraVM is a mobile security virtual machine that aggregates tools and resources that are commonly used for network traffic analysis, mal…☆32Aug 6, 2019Updated 6 years ago
- [BASH] Wordpress bruteforce☆11Oct 9, 2020Updated 5 years ago
- ARP ping detector on local network☆15Feb 3, 2013Updated 13 years ago
- SIP hacking tools and scripts☆23Nov 20, 2020Updated 5 years ago
- ☆15Jan 2, 2026Updated 4 months ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆11Jun 14, 2019Updated 6 years ago
- Threat Hijacking Simple Implementation☆22Feb 24, 2025Updated last year