HugoLB0 / browser-credsLinks
recover Firefox and more browsers logins
β49Updated 4 years ago
Alternatives and similar repositories for browser-creds
Users that are interested in browser-creds are comparing it to the libraries listed below
Sorting:
- π Reverse shell written on python3β14Updated 5 years ago
- Bypass Windows Defender with py2exe from memory.β39Updated 3 years ago
- Red Team C2 and Post Exploitation codeβ34Updated 6 months ago
- WH-Encryptor Android + Windows with Extra tools and Features | antivirus Bypass 99% | wh-Cyberspaceβ28Updated 5 years ago
- Python3 script to generate Office macros for the EvilOSX framework. Author: Cedric Owensβ28Updated 5 years ago
- Antiscan.me automatization scriptβ29Updated last year
- Disable Windows Defender All Versionβ31Updated 5 years ago
- WIP Post-exploitation framework tailored for hypervisors.β50Updated 2 years ago
- Passwordless RDP Session Hijackingβ70Updated 4 years ago
- Invoke-SocksProxy is a PowerShell script designed to create reverse proxies.β49Updated 5 years ago
- Inject Macro and DDE code into Excel and Word documents (reverse shell)β60Updated 4 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (Pβ¦β33Updated 6 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits keyβ30Updated 7 years ago
- powershell tool for VM evasionβ42Updated 5 years ago
- MSFVenom Powershell Stager Encoder & Generatorβ16Updated 4 years ago
- Transform your batch (bat) script into one binary.exeβ52Updated last year
- Polymorphic code obfuscator for use in Red Team operationsβ32Updated 3 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"β41Updated 4 years ago
- JALSI - Just Another Lame Shellcode Injectorβ30Updated 4 years ago
- Bind shell that uses Named Pipes as transport and execute PowerShell code through Runspaces.β16Updated 6 years ago
- PE Binary Shellcode Injector - Automated code cave discovery, shellcode injection, ASLR bypass, x86/x64 compatibleβ76Updated 6 years ago
- PoC Ransomware with Coinbase Commerce integration built on C# .NET Framework (console) and PHPβ25Updated 3 years ago
- β49Updated 5 years ago
- SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scannerβ46Updated 5 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engagemeβ¦β21Updated 3 years ago
- β18Updated 3 years ago
- β23Updated 6 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the inβ¦β20Updated 5 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.β17Updated 8 years ago
- A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a decβ¦β33Updated 6 years ago