LukeyJ-turbobk1990 / CollectAndDecrypt
Tools to decrypt Google Chrome, Mozilla Firefox and Microsoft Edge login/password information.
☆15Updated last year
Related projects: ⓘ
- Rubber Ducky powered by NeoKey☆18Updated 3 months ago
- LKM Linux rootkit☆19Updated last year
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆11Updated 10 months ago
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆13Updated 4 months ago
- A C# Tool to gather information about email breaches☆12Updated 8 months ago
- Check for the existence of an email on Google platforms☆12Updated 6 months ago
- SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwords☆12Updated 4 years ago
- Create a lnk shortcut file for Windows☆12Updated 5 years ago
- ☆24Updated 10 months ago
- ☆14Updated this week
- ☆20Updated last year
- RATs library 2003 to present☆11Updated 11 months ago
- Machine Learning basics with phishing dataset☆10Updated 3 years ago
- CVE-2013-4786 Go exploitation tool☆36Updated 10 months ago
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆15Updated this week
- Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.☆37Updated 11 months ago
- A simple website to act as a store for havoc modules and extensions☆21Updated 4 months ago
- Shell hunter for AF☆34Updated 2 years ago
- ☆28Updated last year
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated last year
- A BrainF*ck Inspired Shell Obfuscation Proof-of-Concept☆14Updated 6 months ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 3 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Updated 3 years ago
- masscan with exclusive excludes☆55Updated 10 months ago
- Recon-ng modules for basic OSINT.☆9Updated 2 years ago
- A Fast & free Windows remote administration tool.☆10Updated 2 years ago
- Only for educational purposes☆11Updated last year
- Poc script for ProxyShell exploit chain in Exchange Server☆16Updated 2 years ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆19Updated 10 months ago
- ECC Public Key Cryptography☆33Updated 10 months ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆20Updated 2 months ago