PoC Bypass Chrome Cookies App-Bound Encryption v20
☆10Apr 9, 2025Updated last year
Alternatives and similar repositories for chrome-bypass
Users that are interested in chrome-bypass are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- HVNC PoC (Hidden VNC) in Rust☆41Sep 2, 2025Updated 8 months ago
- Telegram bot to create membership and license system in your group. User is banned/kicked after their subscription expires.☆14Nov 15, 2024Updated last year
- Hide your Ass by changing Public IP and userAgents in every 10 seconds - CYBERSECURITY☆10Feb 19, 2023Updated 3 years ago
- StegX is a modern, open-source steganography toolkit designed for digital forensics experts and cybersecurity professionals. It offers f…☆24Updated this week
- This Remote Access Tool (RAT), built with Go, is controlled via a Discord bot. The bot connects to a target machine and allows remote con…☆12Jun 28, 2025Updated 10 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A C and Go /proc/pid/maps cloak of invisibilty for shared object files☆22Nov 19, 2025Updated 5 months ago
- This is a PAM Skeleton Key that can be used for persistence, lateral movement, and privilege escalation.☆43Apr 23, 2026Updated last week
- Toolkit for Active Directory security assessments.☆10Jun 4, 2024Updated last year
- Introducing my spritesheet editor app! Built with C++ using OpenCV, SFML, and ImGUI. It was a challenging but rewarding project, and I'm …☆11Apr 29, 2023Updated 3 years ago
- Dumping LSASS Evaded Endpoint Security Solutions☆18Feb 15, 2025Updated last year
- A unique introduction to native runtime obfuscation.☆76Mar 2, 2025Updated last year
- Copy metadata and digital signatures information from one Windows executable to another using Wine on a non-Windows platform☆18Apr 17, 2024Updated 2 years ago
- Demise is Golang malware that uses Discord for communication.☆13Oct 23, 2024Updated last year
- A simple trojan made for Windows in Python.☆11Feb 8, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- example using NtCreateUserProcess in rust☆19Jan 20, 2025Updated last year
- ☆18Aug 8, 2024Updated last year
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆33Dec 31, 2025Updated 4 months ago
- Python based tool for generating Shellcode from PIC C☆43Nov 6, 2025Updated 5 months ago
- Shellcode injection using the Windows Debugging API☆178Jan 4, 2026Updated 4 months ago
- Exploit vulnerabilities in NeacSafe64.sys to achieve privilege escalation and kernel-mode shellcode execution☆21Apr 2, 2025Updated last year
- A Dockerized build pipeline for custom Windows x64 shellcode☆54Dec 12, 2025Updated 4 months ago
- A quick command line utility that generates uses simple addition to obfuscate individual characters, then executes it☆16Jun 13, 2025Updated 10 months ago
- This repository contains my complete resources and coding practices for malware development using Rust 🦀.☆16Jan 15, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆20Dec 14, 2021Updated 4 years ago
- Load various payload (DLL from memory, Exe, etc...) in a way to evade static analysis of Antivirus. It can fetch data from various method…☆22Apr 18, 2026Updated 2 weeks ago
- ☆61Oct 24, 2025Updated 6 months ago
- Event Tracing for Windows EDR bypass in Rust (usermode)☆40Jun 9, 2024Updated last year
- ☆85Feb 12, 2026Updated 2 months ago
- RegStrike is a .reg payload generator☆57Sep 19, 2023Updated 2 years ago
- A MCP implementation of Frida that seeks to emulate Cheat Engine functionally to allow for seamless Game Hacking by AI agents☆58Dec 4, 2025Updated 5 months ago
- Audiodg.exe DLL hijacking for LPE with reboot-free restart primitive. Executes code as LOCAL SERVICE, escalates to SYSTEM via Scheduled T…☆92Jan 24, 2026Updated 3 months ago
- PoC for a Havoc agent/handler setup with all C2 traffic routed through GitHub. No direct connections: all commands and responses are rela…☆46Jul 9, 2025Updated 9 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A discord Remote Administration Tool. Easy to use, undetected and powerfull.☆25Apr 10, 2026Updated 3 weeks ago
- C2-agnostic BOF collection, categorized by attack chain phase. Designed to be small and modular, allowing for quick execution and automat…☆291Apr 26, 2026Updated last week
- ☆59Feb 19, 2026Updated 2 months ago
- PyRAT is a powerful CTF (Capture The Flag) rootkit designed to be used in cybersecurity competitions and educational settings. It provide…☆29Apr 15, 2025Updated last year
- Analysis and Implementation of Image Steganography methods using Java☆36Apr 25, 2017Updated 9 years ago
- ☆78Apr 8, 2026Updated 3 weeks ago
- sigreturn-oriented(SROP) based sleep obfuscation poc for Linux☆69Dec 15, 2025Updated 4 months ago