HugoLB0 / browser-creds
recover Firefox and more browsers logins
β49Updated 3 years ago
Alternatives and similar repositories for browser-creds:
Users that are interested in browser-creds are comparing it to the libraries listed below
- π Reverse shell written on python3β14Updated 4 years ago
- Cross platform system wide proxy server & TLS Interception library for Pythonβ22Updated last year
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engagemeβ¦β19Updated 2 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLYβ24Updated 6 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.β18Updated 7 years ago
- Antiscan.me automatization scriptβ26Updated 10 months ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (Pβ¦β34Updated 5 years ago
- Bypass Windows Defender with py2exe from memory.β36Updated 3 years ago
- Stealthy DDE Exploit Payload generator and injector for DOCX filesβ16Updated 6 years ago
- Rasta's mouse AMSI patch but with function that makes it undetectable.β12Updated 3 years ago
- Red Team C2 and Post Exploitation Codeβ36Updated last week
- Sp00fer blog post -β26Updated 2 years ago
- Malware campaigns and APTs research by BlackArrowβ18Updated 4 years ago
- Pdf File : Exfiltration and Uploading DATA by DNS Traffic (AAAA Records)β10Updated last year
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)β26Updated 4 years ago
- Spider or repeater to find all links.β13Updated 4 years ago
- Site fast fuzzing with chorme extension.β25Updated 3 years ago
- Automate the creation of Backdoors and postexplotation activitiesβ22Updated 2 years ago
- CVE-2020-0688β10Updated 5 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010β41Updated 7 years ago
- A FUD Backdoor Reverse Shell coded in CPP for any Windows distribution, that will fire a decoy app in the foreground while connecting bacβ¦β20Updated 5 years ago
- Disable Windows Defender All Versionβ31Updated 4 years ago
- Simple C2 over the Trello APIβ38Updated 2 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the inβ¦β19Updated 4 years ago
- A malicious .cab creation tool for CVE-2021-40444β12Updated 3 years ago
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many moreβ12Updated 2 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan β¦β50Updated 4 years ago
- pure python remote adb scanner + nmap scan moduleβ21Updated 6 years ago
- Advanced python HTTP reverse shell made for Hacking Competition purpose. I am not responsible of what you do with this tool.β25Updated last year
- JALSI - Just Another Lame Shellcode Injectorβ30Updated 3 years ago