HugoLB0 / browser-credsLinks
recover Firefox and more browsers logins
β49Updated 4 years ago
Alternatives and similar repositories for browser-creds
Users that are interested in browser-creds are comparing it to the libraries listed below
Sorting:
- π Reverse shell written on python3β14Updated 5 years ago
- WIP Post-exploitation framework tailored for hypervisors.β50Updated 2 years ago
- Bypass Windows Defender with py2exe from memory.β39Updated 3 years ago
- Antiscan.me automatization scriptβ29Updated last year
- Red Team C2 and Post Exploitation codeβ34Updated 7 months ago
- powershell tool for VM evasionβ42Updated 5 years ago
- Disable Windows Defender All Versionβ31Updated 5 years ago
- Python3 script to generate Office macros for the EvilOSX framework. Author: Cedric Owensβ28Updated 5 years ago
- π Help find Trojan Source vulnerability in code π . Useful for code review in project with multiple collaborators (CI/CD)β47Updated 2 years ago
- Invoke-SocksProxy is a PowerShell script designed to create reverse proxies.β49Updated 5 years ago
- Sp00fer blog post -β24Updated 3 years ago
- PoC Ransomware with Coinbase Commerce integration built on C# .NET Framework (console) and PHPβ25Updated 3 years ago
- Machine Learning basics with phishing datasetβ10Updated 4 years ago
- Basic Dart reverse shell codeβ21Updated 2 years ago
- WH-Encryptor Android + Windows with Extra tools and Features | antivirus Bypass 99% | wh-Cyberspaceβ28Updated 5 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the inβ¦β20Updated 5 years ago
- SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scannerβ46Updated 5 years ago
- JALSI - Just Another Lame Shellcode Injectorβ30Updated 4 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (Pβ¦β33Updated 6 years ago
- Passwordless RDP Session Hijackingβ70Updated 4 years ago
- CloudflaredRAT is a simple combination of popular open-source tools, wrapping a local-facing shell with Cloudflares Argo Tunnel in an exeβ¦β14Updated 5 years ago
- PE Binary Shellcode Injector - Automated code cave discovery, shellcode injection, ASLR bypass, x86/x64 compatibleβ76Updated 6 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engagemeβ¦β21Updated 3 years ago
- Malware campaigns and APTs research by BlackArrowβ19Updated 5 years ago
- post exploitation user monitoring toolβ20Updated 7 years ago
- A malicious .cab creation tool for CVE-2021-40444β13Updated 4 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloadsβ26Updated 3 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"β41Updated 4 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.β22Updated 4 years ago
- Rasta's mouse AMSI patch but with function that makes it undetectable.β13Updated 4 years ago