Mich-ele / chrome-cookie-extractorLinks
extract chromium-based browser's cookies using chrome's remote debugging without admin rights
☆21Updated 8 months ago
Alternatives and similar repositories for chrome-cookie-extractor
Users that are interested in chrome-cookie-extractor are comparing it to the libraries listed below
Sorting:
- (EDR) Dll Unhooking = kernel32.dll, kernelbase.dll, ntdll.dll, user32.dll, apphelp.dll, msvcrt.dll.☆35Updated last month
- A mutliple tactics to execute shellcode in go :}☆20Updated 2 months ago
- Without closing windows defender, to make defender useless by removing its token privileges and lowering the token integrity.☆32Updated 3 years ago
- golang decryption poc of the new app bound encryption introduced in chrome version 127.☆21Updated 8 months ago
- Loading Fileless Remote PE from URI to memory with argument passing and ETW patching and NTDLL unhooking and No New Thread technique☆67Updated 2 years ago
- Bypassing Major EDR's with staged shellcode, custom getmodulehandleW and getprocaddress, veh syscalls & more.☆20Updated 2 months ago
- Evasive loader to bypass static detection☆58Updated last year
- ShadeLoader is a shellcode loader designed to bypass most antivirus software. 壳代码, 杀毒软件, 绕过☆40Updated last month
- Some anti-sandbox techniques implemented in Golang.☆11Updated last year
- VBS-Obfuscator-GO is a Go-based tool designed for obfuscating VBScript (VBS) files. It transforms readable VBScript code into a less reco…☆36Updated 2 months ago
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆85Updated 2 years ago
- Change hash for a signed pe☆16Updated 2 years ago
- ☆43Updated 2 years ago
- Generator of https://github.com/TheWover/donut in pure Go. supports compression, AMSI/WLDP/ETW bypass, etc.☆59Updated last year
- Dumping App Bound Protected Credentials & Cookies Without Privileges.☆57Updated last month
- A Simple PoC☆21Updated last year
- CSharp reimplementation of Venoma, another C++ Cobalt Strike beacon dropper with custom indirect syscalls execution☆46Updated last year
- frida based script which automates the process of discovering and exploiting DLL Hijacks in target binaries. The discovered binaries can …☆52Updated 2 years ago
- Retrieve the Chrome App Bound key using DLL injection — no administrator privileges required and no need to run from the chrome folder in…☆31Updated 2 months ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆17Updated last year
- Reflective DLL injection Execution☆19Updated 2 years ago
- A rework of CMLuaUtil AutoElevated☆26Updated 2 years ago
- ☆48Updated last year
- A WIP shellcode loader tool which bypasses AV/EDR, coded in C++, and equipped with a minimal builder.☆58Updated 2 months ago
- ☆26Updated last year
- Enable-All-Tokens is a Go-based project designed to adjust and enable a list of specified privileges for the current process token on a W…☆10Updated 2 months ago
- Chrome COOKIE v20 decryption PoC☆123Updated 2 weeks ago
- Preventing 3rd Party DLLs from Injecting into your Malware☆25Updated 3 years ago
- My personal shellcode loader☆31Updated 2 years ago
- ☆22Updated last year