Tools to decrypt Google Chrome, Mozilla Firefox and Microsoft Edge login/password information.
☆17Apr 10, 2023Updated 2 years ago
Alternatives and similar repositories for CollectAndDecrypt
Users that are interested in CollectAndDecrypt are comparing it to the libraries listed below
Sorting:
- ☆26Jan 7, 2024Updated 2 years ago
- Yet, Another Packer/Loader☆25Feb 26, 2023Updated 3 years ago
- ☆23Jun 9, 2024Updated last year
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆93Feb 20, 2026Updated 2 weeks ago
- Rubber Ducky powered by NeoKey☆29Jun 3, 2024Updated last year
- LogSnare: A playground for testing, preventing, and logging IDOR vulnerabilities.☆33Mar 4, 2024Updated 2 years ago
- ☆11Feb 14, 2023Updated 3 years ago
- POC for DLL Proxying / Hijacking☆63May 26, 2025Updated 9 months ago
- A user enumeration tool for Slack.☆36Jun 10, 2024Updated last year
- Reasonably undetected shellcode stager and executer.☆36May 23, 2025Updated 9 months ago
- Analysis of the Enterprise SAST/DAST product landscape☆38Feb 28, 2024Updated 2 years ago
- Cybersecurity Psychology Framework☆19Feb 22, 2026Updated last week
- Bypass Xiaomi RSA 256 EDL Auth☆13Sep 2, 2025Updated 6 months ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Feb 6, 2024Updated 2 years ago
- Unfixed Windows PowerShell Filename Code Execution POC☆41Dec 26, 2023Updated 2 years ago
- 一款可以高度自定义的 API 信息收集与记录 Burp扩展套件☆11Dec 1, 2024Updated last year
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- A fully automated setup of Shibboleth Idp and SP with many options and features☆12Mar 31, 2022Updated 3 years ago
- Launcher for the fifa live editor☆10Feb 17, 2026Updated 2 weeks ago
- a cli google client that bypasses captcha and rate limiting by using the google alerts "preview" feature☆47Aug 2, 2023Updated 2 years ago
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆51Mar 7, 2025Updated 11 months ago
- A containerized LDAP client web application based on web2ldap☆12Oct 24, 2016Updated 9 years ago
- Personal infrastructure☆13Feb 12, 2026Updated 3 weeks ago
- A Nomad Runner for Gitlab CI☆13Sep 20, 2025Updated 5 months ago
- A tool to find/download malware samples from various public repositories☆12Dec 22, 2021Updated 4 years ago
- Role to install Proxmox Mail Gateway on a linux server☆15Oct 25, 2025Updated 4 months ago
- A Python client for the Global CVE Allocation System.☆17Jan 31, 2026Updated last month
- Convert MHTM file to single html embedded all resources with base64 encoding☆10Jan 7, 2019Updated 7 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- ☆12Oct 17, 2023Updated 2 years ago
- ☆10Jan 24, 2023Updated 3 years ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆17Jun 22, 2024Updated last year
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- ☆16Sep 20, 2023Updated 2 years ago
- ☆10Sep 20, 2020Updated 5 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- ☆11Apr 1, 2025Updated 11 months ago
- 一款快速全端口扫描的工具,并获取网站标题、指纹识别结果、WAF判断、是否为后台、状态码判断等功能的IP信息收集工具。☆13Sep 21, 2023Updated 2 years ago
- 生异形吗?挖掘构建你自己的Java内存马!☆14May 22, 2025Updated 9 months ago