Maldev-Academy / DumpBrowserSecretsLinks
Extracts browser-stored data such as refresh tokens, cookies, saved credentials, credit cards, autofill entries, browsing history, and bookmarks from modern Chromium-based and Gecko-based browsers (Chrome, Microsoft Edge, Firefox, Opera, Opera GX, and Vivaldi)
☆466Updated this week
Alternatives and similar repositories for DumpBrowserSecrets
Users that are interested in DumpBrowserSecrets are comparing it to the libraries listed below
Sorting:
- SilentButDeadly is a network communication blocker specifically designed to neutralize EDR/AV software by preventing their cloud connecti…☆431Updated 2 months ago
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆444Updated 3 weeks ago
- Venom C2 is a dependency‑free Python3 Command & Control framework for redteam persistence☆417Updated 2 months ago
- Dig your way out of networks like a Meerkat using SSH tunnels via ClickOnce.☆264Updated 9 months ago
- A user-mode code and its rootkit that will Kill EDR Processes permanently by leveraging the power of Process Creation Blocking Kernel Cal…☆254Updated 7 months ago
- Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.☆360Updated 5 months ago
- Invoke-ArgFuscator is an open-source, cross-platform PowerShell module that helps generate obfuscated command-lines for common system-nat…☆260Updated 9 months ago
- Extract data from modern Chrome versions, including refresh tokens, cookies, saved credentials, autofill data, browsing history, and book…☆540Updated 3 weeks ago
- Enhance Your Active Directory Password Spraying with User Intelligence.☆311Updated last month
- Tool to enumerate privileged Scheduled Tasks on Remote Systems☆275Updated 2 weeks ago
- RunPE implementation with multiple evasive techniques (2)☆265Updated 4 months ago
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆191Updated last year
- ☆376Updated 3 months ago
- A powerful, modular, lightweight and efficient command & control framework written in Nim.☆216Updated 2 months ago
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆223Updated 9 months ago
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆215Updated 3 months ago
- Execute commands interactively on remote Windows machines using the WinRM protocol☆319Updated last week
- Python3 utility for creating zip files that smuggle additional data for later extraction☆264Updated 8 months ago
- An Ansible role that install the Adaptix C2 server and/or client on Debian based hosts☆175Updated 8 months ago
- Founding is a generator that will create a loader encrypted or obfuscated with different execution types☆111Updated 5 months ago
- Windows Session Hijacking via COM☆331Updated last month
- PowerShell Obfuscator☆226Updated 5 months ago
- lolC2 is a collection of C2 frameworks that leverage legitimate services to evade detection☆255Updated this week
- ☆163Updated 2 months ago
- Reaping treasures from strings in remote processes memory☆285Updated 11 months ago
- .NET post-exploitation toolkit for Active Directory reconnaissance and exploitation☆400Updated 6 months ago
- Offensive GPO dumping and analysis tool that leverages and enriches BloodHound data☆354Updated 3 weeks ago
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆121Updated 7 months ago
- Extract and execute a PE embedded within a PNG file using an LNK file.☆465Updated last year
- 🔥📜 Forbidden collection of Red Team sorcery 📜🔥☆320Updated 2 weeks ago