LukeyJ-turbobk1990 / CollectAndDecryptLinks
Tools to decrypt Google Chrome, Mozilla Firefox and Microsoft Edge login/password information.
☆17Updated 2 years ago
Alternatives and similar repositories for CollectAndDecrypt
Users that are interested in CollectAndDecrypt are comparing it to the libraries listed below
Sorting:
- The best way to send emails in Go.☆10Updated 4 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Updated last year
- A collection of tools adversaries commonly use in an attack.☆14Updated 6 months ago
- LKM Linux rootkit☆20Updated last year
- Database for custom made as well as publicly available stage-2 or beacons or stageless payloads, used by loaders/stage-1/stagers, or for …☆10Updated 3 months ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated 2 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆11Updated 4 years ago
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- ☆12Updated 2 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆12Updated last year
- Free Email Providers☆10Updated last year
- Registry hive parsing the async way☆21Updated 2 months ago
- Fast DNS history enumeration tool for network and OSINT investigations☆18Updated 4 years ago
- Parser for Windows PowerShell script block logs☆13Updated 5 months ago
- Rubber Ducky powered by NeoKey☆25Updated last year
- MAC Address brute forcing tool, used to bypass MAC based filtering☆16Updated 3 years ago
- Shared library implementations that transform the containing process into a shell when loaded (useful for privilege escalation, argument …☆27Updated last year
- Data EXfiltration TestER☆21Updated 5 years ago
- ☆22Updated last year
- Simple utility to manage multiple ssh☆15Updated 2 years ago
- Exploit for win10 SMB3.1☆17Updated 5 years ago
- Just Enough C2 - A simple but effective server and implant☆9Updated 2 years ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 4 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆24Updated 3 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆9Updated 8 years ago
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆18Updated 6 months ago
- Monitor malware scanning services for your payloads☆11Updated 3 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Updated 8 years ago
- A malicious keyboard that delivers a multi-staged attack, consisting of a trojan payload which can bypass antivirus, with Windows machine…☆12Updated 2 months ago