HugoLB0 / browser-creds
recover Firefox and more browsers logins
β49Updated 3 years ago
Alternatives and similar repositories for browser-creds:
Users that are interested in browser-creds are comparing it to the libraries listed below
- Antiscan.me automatization scriptβ27Updated 8 months ago
- π Reverse shell written on python3β15Updated 4 years ago
- Rasta's mouse AMSI patch but with function that makes it undetectable.β12Updated 3 years ago
- Bypass Windows Defender with py2exe from memory.β36Updated 3 years ago
- Sp00fer blog post -β26Updated 2 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engagemeβ¦β19Updated 2 years ago
- Fast DNS history enumeration tool for network and OSINT investigationsβ17Updated 4 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchangeβ16Updated 4 years ago
- A collection of personal ZAP scriptsβ14Updated last year
- PowerShell script to help with privilege escalation on a compromised Windows box.β22Updated 5 years ago
- Commands to perform various activities related to penetration testing and red teamingβ19Updated 5 years ago
- Automate the creation of Backdoors and postexplotation activitiesβ22Updated 2 years ago
- Spider or repeater to find all links.β13Updated 4 years ago
- Malware campaigns and APTs research by BlackArrowβ18Updated 4 years ago
- RDP THIEF - inject dll to remote desktop process (mstsc.exe) and steal user credentials.β13Updated 3 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the inβ¦β19Updated 4 years ago
- PoC Ransomware with Coinbase Commerce integration built on C# .NET Framework (console) and PHPβ24Updated 2 years ago
- Modern Javascript keylogger with web panelβ22Updated 4 years ago
- Stealthy DDE Exploit Payload generator and injector for DOCX filesβ16Updated 6 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan β¦β50Updated 4 years ago
- Pdf File : Exfiltration and Uploading DATA by DNS Traffic (AAAA Records)β10Updated last year
- Inject Macro and DDE code into Excel and Word documents (reverse shell)β55Updated 3 years ago
- Web crawler and downloader based on GNU Wget.β12Updated last year
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (Pβ¦β35Updated 5 years ago
- Automated encryption utilities and installationβ12Updated 4 years ago
- pure python remote adb scanner + nmap scan moduleβ21Updated 6 years ago
- Machine Learning basics with phishing datasetβ10Updated 3 years ago
- Remote Thread Injection by C# + Delegate Techniquesβ12Updated last year
- Inject Metasploit Shell Code in Legitimate Processβ11Updated 3 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.β18Updated 7 years ago