Krptyk / chromeDekrptLinks
A utility to decrypt and retrieve encrypted data (either cookies or login credentials) from Chromium SQLite databases.
☆11Updated 2 years ago
Alternatives and similar repositories for chromeDekrpt
Users that are interested in chromeDekrpt are comparing it to the libraries listed below
Sorting:
- A collection of tools adversaries commonly use in an attack.☆14Updated last year
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 3 years ago
- passat - password auditing tool. Does statistical analyses on large sets of cracked passwords.☆25Updated 3 years ago
- ☆12Updated 2 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆56Updated 2 years ago
- Data EXfiltration TestER☆21Updated 6 years ago
- The long shadow to emerge as other Git repositories☆18Updated last year
- Network Traffic Fuzzer☆17Updated last year
- A Docker container used to easily compile Nim binaries generated by my tools (NimPackt and NimPlant)☆16Updated 2 years ago
- ☆10Updated 7 years ago
- Mimikatz embedded as classes☆28Updated 4 years ago
- Autopsy Module to analyze Registry Hives☆15Updated 3 years ago
- top usernames from azure survey 2025☆14Updated 8 months ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Updated 5 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆24Updated 4 years ago
- golang program to parse Pastebin for keywords and send them per E-Mail☆34Updated 4 months ago
- A collection of my presentation materials.☆17Updated last year
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆13Updated 5 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 4 years ago
- The best way to send emails in Go.☆12Updated 4 years ago
- Dumping credentials through windbg and pykd☆41Updated 2 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Updated 2 years ago
- Repository for LNK stuff☆31Updated 3 years ago
- Malware campaigns and APTs research by BlackArrow☆19Updated 5 years ago
- A C# Tool to gather information about email breaches☆16Updated 2 years ago
- ☆28Updated 4 years ago
- An analysis of the user password hashing algorithm used by Citrix NetScaler☆15Updated 3 months ago
- ☆13Updated 5 years ago
- Periodically check hashcat cracking progress and notify of success.☆10Updated 7 years ago
- Quick and dirty PoSH code to read teams messages☆23Updated 11 months ago