Tools to decrypt Google Chrome, Mozilla Firefox and Microsoft Edge login/password information.
☆17Apr 10, 2023Updated 2 years ago
Alternatives and similar repositories for CollectAndDecrypt
Users that are interested in CollectAndDecrypt are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Extract cookies from Chrome, Chromium or Firefox sqlite cookie stores into a wget-compatible cookies.txt file☆19Feb 7, 2021Updated 5 years ago
- Bypass Xiaomi RSA 256 EDL Auth☆13Sep 2, 2025Updated 6 months ago
- A simple class in C++ to load and read/write process memory, it comes with an example of how to decrypt the once popular demoscene e-zine…☆17Feb 5, 2015Updated 11 years ago
- Personal Blog. Technology Enthusiast, CTF Player, Vulnerability Research, Reverse Engineering, Pen-Testing, and other.☆11Sep 13, 2023Updated 2 years ago
- Thrift API for Xiaomi Structured Datastore Service☆13Feb 28, 2015Updated 11 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ApertaCookie is a PowerShell module that can extract and decrypt cookie data from the SQLite databases of several popular browsers.☆13Apr 3, 2022Updated 3 years ago
- Web scraping | Website cloner | Path Traversal Scanner☆16Sep 27, 2025Updated 5 months ago
- Simple Bot untuk Flash Sale Shoopee☆15Dec 11, 2020Updated 5 years ago
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆93Feb 20, 2026Updated last month
- POC for DLL Proxying / Hijacking☆63May 26, 2025Updated 10 months ago
- secret website very interesting☆10Apr 24, 2022Updated 3 years ago
- Simple vtuber app.☆13Oct 17, 2022Updated 3 years ago
- TP-Link TL-WR1043ND - Authenticated Remote Code Execution☆16Jul 29, 2025Updated 7 months ago
- Auth system with encryption and web dashboard in python☆19May 7, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- [Obsolete] Fixup .Net Assembly dumped, if it can't work.☆19Aug 1, 2018Updated 7 years ago
- ☆10Jan 24, 2023Updated 3 years ago
- JObfuscator is a source code obfuscator for the Java language. Protect Java source code & algorithms from hacking, cracking, reverse engi…☆11Mar 11, 2023Updated 3 years ago
- reverse engineering random malwares☆22Mar 12, 2026Updated 2 weeks ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Feb 6, 2024Updated 2 years ago
- local reverse proxy for any http(s) sites to send requests from a domain to another, runs faster than mitmdump☆13Apr 8, 2019Updated 6 years ago
- This is a Python script that downloads all resources (images, scripts, stylesheets, etc.) from a given website.☆17Jul 1, 2024Updated last year
- Ingest Nessus files into Elasticsearch using PowerShell!☆19Updated this week
- Reasonably undetected shellcode stager and executer.☆35May 23, 2025Updated 10 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- CVE-2019-18890 POC (Proof of Concept)☆10Jan 6, 2020Updated 6 years ago
- Juniper Junos Space (CVE-2020-1611) (PoC)☆29Jan 22, 2020Updated 6 years ago
- A user enumeration tool for Slack.☆36Jun 10, 2024Updated last year
- ☆12Aug 23, 2016Updated 9 years ago
- "Low-Cost Infrasound-Based Collision Avoidance System for Industrial Vehicles"☆17Apr 21, 2025Updated 11 months ago
- 改造一个基于jrmp的AMF反序列化利用工具☆16Jul 7, 2022Updated 3 years ago
- Exploit for Red Hat / GlusterFS CVE-2018-1088 & CVE-2018-1112, featured @ DEFCON 26, Las Vegas!☆10Apr 30, 2020Updated 5 years ago
- ☆20Jan 12, 2022Updated 4 years ago
- ☆10Jan 26, 2016Updated 10 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆27Nov 21, 2017Updated 8 years ago
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Feb 10, 2015Updated 11 years ago
- Login and Register System using C# for Windows Forms☆17Apr 11, 2023Updated 2 years ago
- A C# Winforms based GUI app, that allows you to extract files from Drakengard 1 and 2. repacking is supported too.☆14Jul 11, 2025Updated 8 months ago
- Unfixed Windows PowerShell Filename Code Execution POC☆41Dec 26, 2023Updated 2 years ago
- Kill Switch Script - stops traffic leaking from you if your VPN goes down.☆13Sep 20, 2016Updated 9 years ago
- A collection of short scripts for analysis, encryption and forensics, that can be used for CTF and/or security assessments☆10Sep 22, 2015Updated 10 years ago