HugoLB0 / browser-credsLinks
recover Firefox and more browsers logins
β48Updated 4 years ago
Alternatives and similar repositories for browser-creds
Users that are interested in browser-creds are comparing it to the libraries listed below
Sorting:
- π Reverse shell written on python3β14Updated 4 years ago
- Bypass Windows Defender with py2exe from memory.β38Updated 3 years ago
- Red Team C2 and Post Exploitation codeβ36Updated 4 months ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (Pβ¦β34Updated 6 years ago
- Python3 script to generate Office macros for the EvilOSX framework. Author: Cedric Owensβ28Updated 5 years ago
- Disable Windows Defender All Versionβ31Updated 4 years ago
- WIP Post-exploitation framework tailored for hypervisors.β51Updated 2 years ago
- Antiscan.me automatization scriptβ31Updated last year
- PoC Ransomware with Coinbase Commerce integration built on C# .NET Framework (console) and PHPβ25Updated 3 years ago
- β18Updated 3 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloadsβ26Updated 3 years ago
- JALSI - Just Another Lame Shellcode Injectorβ30Updated 4 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"β40Updated 4 years ago
- MSFVenom Powershell Stager Encoder & Generatorβ16Updated 4 years ago
- powershell tool for VM evasionβ42Updated 5 years ago
- Polymorphic code obfuscator for use in Red Team operationsβ31Updated 3 years ago
- A local LKM rootkit loader/dropper that lists available security mechanismsβ52Updated 4 years ago
- Invoke-SocksProxy is a PowerShell script designed to create reverse proxies.β49Updated 4 years ago
- Malware campaigns and APTs research by BlackArrowβ19Updated 5 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the inβ¦β20Updated 5 years ago
- β50Updated 5 years ago
- Transform your batch (bat) script into one binary.exeβ51Updated last year
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engagemeβ¦β21Updated 3 years ago
- A Botnet builder built on Elasticsearch and Kibana with the help of C++ and Python3β22Updated 5 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits keyβ30Updated 6 years ago
- SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scannerβ47Updated 5 years ago
- Inject Macro and DDE code into Excel and Word documents (reverse shell)β60Updated 4 years ago
- Rasta's mouse AMSI patch but with function that makes it undetectable.β13Updated 4 years ago
- I used this to see if an EDR is running in Safe Modeβ36Updated 4 years ago
- ASLR Evasion, Egghunters, SEH Overwritesβ29Updated 4 years ago