Ierofantis / Chrome_VenomLinks
π Copy passwords from Crome and send them via email,Python && win32crypt 
β40Updated 9 years ago
Alternatives and similar repositories for Chrome_Venom
Users that are interested in Chrome_Venom are comparing it to the libraries listed below
Sorting:
- A ctypes powered python keylogger.β109Updated 5 years ago
 - Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android), multi function RAT (Remote Administration Tool) mainly written in pβ¦β87Updated 7 years ago
 - A simple bash based metasploit automation tool!β124Updated 2 years ago
 - Powershell Reverse Rubber Duckyβ57Updated 10 years ago
 - A PHP Based Tool That Helps You To Manage All Your Backdoored Websites Efficiently.β126Updated 2 years ago
 - Exploit pack for pentesters and ethical hackers.β115Updated 8 years ago
 - Python script that will extract all saved passwords from your google chrome database on windows onlyβ79Updated 5 years ago
 - trolo - an easy to use script for generating Payloads that bypasses antivirusβ51Updated 8 years ago
 - These are various simple python scripts that can be used to aid pentesters. None of these are overly complex, but should serve as a greaβ¦β23Updated 7 years ago
 - Linset is a WPA/WPA2 phishing tool (evil twin)β143Updated 2 years ago
 - A script written lazily for generating cross-platform backdoors on the go :)β190Updated 7 years ago
 - some python3 functions to add spreading features to any python backdoorβ55Updated 8 years ago
 - Basic python script for detect airdroid users in lanβ49Updated 5 years ago
 - imR0T: Send a quick message with simple text encryption to your whatsapp contact and protect your text by encrypting and decrypting, basiβ¦β76Updated 6 years ago
 - Massive arsenal of hacker tools...β80Updated 8 years ago
 - Various codes related to Ransomware Developementβ124Updated 8 years ago
 - wifi attacks suiteβ60Updated 5 years ago
 - Loki.Rat is a fork of the Ares RAT, it integrates new modules, like recording , lockscreen , and locate options. Loki.Rat is a Python Remβ¦β78Updated 2 years ago
 - Use Invoke-PSImage to deliver a payload in an Imageβ53Updated 7 years ago
 - Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensyβ145Updated 8 years ago
 - A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machinesβ29Updated 10 years ago
 - Credentials recovery projectβ44Updated 9 years ago
 - Network Infrastructure Penetration Testing Toolβ15Updated 8 years ago
 - Capstone: Keylogger Trojanβ35Updated 7 years ago
 - Powershell Framework to make an USB auto-executable on infected machines.β36Updated 8 years ago
 - Simple security surveillance script for linux distributions.β60Updated 8 years ago
 - Generate Payloads and Control Remote Machines. [Discontinued]β223Updated 4 years ago
 - WPS scan and pwn toolβ70Updated 5 years ago
 - MitM pentesting opensource toolkit (scan/sniff/exploit) -- NOT SUPORTED ANYMORE --β75Updated 8 years ago
 - Phishing webapp generatorβ42Updated 7 years ago