PoC Bypass Chrome Cookies App-Bound Encryption v20
☆12Apr 9, 2025Updated 10 months ago
Alternatives and similar repositories for chrome-bypass
Users that are interested in chrome-bypass are comparing it to the libraries listed below
Sorting:
- Telegram bot to create membership and license system in your group. User is banned/kicked after their subscription expires.☆14Nov 15, 2024Updated last year
- HVNC PoC (Hidden VNC) in Rust☆40Sep 2, 2025Updated 6 months ago
- This Remote Access Tool (RAT), built with Go, is controlled via a Discord bot. The bot connects to a target machine and allows remote con…☆10Jun 28, 2025Updated 8 months ago
- StegX is a modern, open-source steganography toolkit designed for digital forensics experts and cybersecurity professionals. It offers f…☆23Feb 23, 2026Updated last week
- Hide your Ass by changing Public IP and userAgents in every 10 seconds - CYBERSECURITY☆10Feb 19, 2023Updated 3 years ago
- Dumping LSASS Evaded Endpoint Security Solutions☆18Feb 15, 2025Updated last year
- Toolkit for Active Directory security assessments.☆10Jun 4, 2024Updated last year
- A C and Go /proc/pid/maps cloak of invisibilty for shared object files☆21Nov 19, 2025Updated 3 months ago
- A simple trojan made for Windows in Python.☆11Feb 8, 2025Updated last year
- Demise is Golang malware that uses Discord for communication.☆13Oct 23, 2024Updated last year
- Introducing my spritesheet editor app! Built with C++ using OpenCV, SFML, and ImGUI. It was a challenging but rewarding project, and I'm …☆11Apr 29, 2023Updated 2 years ago
- A unique introduction to native runtime obfuscation.☆75Mar 2, 2025Updated last year
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆31Dec 31, 2025Updated 2 months ago
- Exploit vulnerabilities in NeacSafe64.sys to achieve privilege escalation and kernel-mode shellcode execution☆21Apr 2, 2025Updated 11 months ago
- A quick command line utility that generates uses simple addition to obfuscate individual characters, then executes it☆16Jun 13, 2025Updated 8 months ago
- Copy metadata and digital signatures information from one Windows executable to another using Wine on a non-Windows platform☆18Apr 17, 2024Updated last year
- Load various payload (DLL from memory, Exe, etc...) in a way to evade static analysis of Antivirus. It can fetch data from various method…☆15Updated this week
- A MCP implementation of Frida that seeks to emulate Cheat Engine functionally to allow for seamless Game Hacking by AI agents☆41Dec 4, 2025Updated 3 months ago
- This repository contains my complete resources and coding practices for malware development using Rust 🦀.☆16Jan 15, 2025Updated last year
- Shellcode injection using the Windows Debugging API☆171Jan 4, 2026Updated 2 months ago
- A discord Remote Administration Tool. Easy to use, undetected and powerfull.☆21Aug 30, 2025Updated 6 months ago
- Python based tool for generating Shellcode from PIC C☆43Nov 6, 2025Updated 4 months ago
- ☆18Aug 8, 2024Updated last year
- example using NtCreateUserProcess in rust☆19Jan 20, 2025Updated last year
- Detection of indirect syscall techniques using hardware breakpoints and vectored exception handling.☆51Oct 19, 2025Updated 4 months ago
- A Dockerized build pipeline for custom Windows x64 shellcode☆54Dec 12, 2025Updated 2 months ago
- ☆73Feb 12, 2026Updated 3 weeks ago
- ☆20Dec 14, 2021Updated 4 years ago
- Automated DLL Hijacking Detection Tool with Zero False Positives — Discovers, filters, and canary-confirms exploitable DLL hijacks on Win…☆135Updated this week
- Event Tracing for Windows EDR bypass in Rust (usermode)☆39Jun 9, 2024Updated last year
- Audiodg.exe DLL hijacking for LPE with reboot-free restart primitive. Executes code as LOCAL SERVICE, escalates to SYSTEM via Scheduled T…☆89Jan 24, 2026Updated last month
- ☆61Oct 24, 2025Updated 4 months ago
- Collection of BOFs created for red team/adversary engagements. Created to be small and interchangeable, for quick recon or eventing.☆237Feb 20, 2026Updated 2 weeks ago
- Prevent in-process process termination by patching exit APIs☆63Nov 9, 2025Updated 3 months ago
- Red Teaming Tradecraft☆30Sep 28, 2022Updated 3 years ago
- PyRAT is a powerful CTF (Capture The Flag) rootkit designed to be used in cybersecurity competitions and educational settings. It provide…☆29Apr 15, 2025Updated 10 months ago
- PoC for a Havoc agent/handler setup with all C2 traffic routed through GitHub. No direct connections: all commands and responses are rela…☆45Jul 9, 2025Updated 7 months ago
- HvLoader.efi is an EFI application for loading an external hypervisor loader☆66Jun 12, 2023Updated 2 years ago
- Academic research rootkit using ftrace-hooking to hide files and processes via magic word or user/group. Tested until Linux 6.11.☆46Jun 5, 2025Updated 9 months ago