Extracts browser-stored data such as refresh tokens, cookies, saved credentials, credit cards, autofill entries, browsing history, and bookmarks from modern Chromium-based and Gecko-based browsers (Chrome, Microsoft Edge, Firefox, Opera, Opera GX, and Vivaldi)
☆570Feb 14, 2026Updated 2 weeks ago
Alternatives and similar repositories for DumpBrowserSecrets
Users that are interested in DumpBrowserSecrets are comparing it to the libraries listed below
Sorting:
- PoC for generating bthprops.cpl module designed to be loaded by Fsquirt.exe LOLBin☆121Jan 4, 2026Updated last month
- A BOF that's a BOF Loader and more☆198Jan 17, 2026Updated last month
- Extract data from modern Chrome versions, including refresh tokens, cookies, saved credentials, autofill data, browsing history, and book…☆546Jan 8, 2026Updated last month
- Help red teams find opsec processes during engagements☆42Dec 7, 2024Updated last year
- Collection of BOFs created for red team/adversary engagements. Created to be small and interchangeable, for quick recon or eventing.☆235Feb 20, 2026Updated last week
- Stage 0☆169Dec 18, 2024Updated last year
- This C# tool sprays for admin access over the entire domain☆88Dec 7, 2025Updated 2 months ago
- ☆75Jan 1, 2026Updated last month
- SilentButDeadly is a network communication blocker specifically designed to neutralize EDR/AV software by preventing their cloud connecti…☆435Nov 3, 2025Updated 3 months ago
- This is the tool to dump the LSASS process on modern Windows 11☆557Nov 1, 2025Updated 3 months ago
- ☆169Oct 21, 2025Updated 4 months ago
- PowerShell scripts for alternative SharpHound enumeration, including users, groups, computers, and certificates, using the ActiveDirector…☆400Jan 14, 2026Updated last month
- UDC2 implementation that provides an ICMP C2 channel☆115Nov 24, 2025Updated 3 months ago
- peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser.☆223Apr 14, 2025Updated 10 months ago
- NSecSoftBYOVD POC☆56Feb 12, 2026Updated 2 weeks ago
- Linux Process Injection via Seccomp Notifier☆83Dec 9, 2025Updated 2 months ago
- Arsenal of modules to beacon postex☆94Feb 18, 2026Updated last week
- sideloading PoC using onedrive.exe & version.dll☆91Oct 30, 2025Updated 3 months ago
- A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.☆614Jan 2, 2025Updated last year
- Golang Automation Framework for Cobalt Strike using the Rest API☆56Dec 4, 2025Updated 2 months ago
- EDR-Freeze is a tool that puts a process of EDR, AntiMalware into a coma state.☆806Nov 1, 2025Updated 3 months ago
- Reaping treasures from strings in remote processes memory☆285Feb 8, 2025Updated last year
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆776Jan 26, 2026Updated last month
- Open Source Implementation of Cobalt Strike's Malleable C2☆94Jan 27, 2026Updated last month
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆167Oct 21, 2025Updated 4 months ago
- Early Bird Cryo Injections – APC-based DLL & Shellcode Injection via Pre-Frozen Job Objects☆137Apr 6, 2025Updated 10 months ago
- SOCKS5 proxy tool that uses Azure Blob Storage as a means of communication.☆309Feb 16, 2026Updated last week
- AV/EDR Lab environment setup references to help in Malware development☆424Feb 19, 2025Updated last year
- Abusing Azure services over C2☆368Jan 20, 2026Updated last month
- Collection of UAC Bypass Techniques Weaponized as BOFs☆607Feb 21, 2024Updated 2 years ago
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆203Mar 6, 2025Updated 11 months ago
- Proof of concept for Kerberos Armoring abuse.☆80Dec 12, 2025Updated 2 months ago
- COM ViewLogger — new malware keylogging technique☆404Jan 6, 2025Updated last year
- Mythic C2 Agent written in x64 PIC C☆85Jan 29, 2025Updated last year
- AdaptixC2 is a highly modular advanced redteam toolkit☆2,733Updated this week
- Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loader.☆281Apr 6, 2025Updated 10 months ago
- 🧙♂️ Node.js Command & Control for Script-Jacking Vulnerable Electron Applications☆1,292Jun 17, 2025Updated 8 months ago
- A portable C# utility for enumerating local and remote windows sessions☆55Jan 1, 2026Updated last month