Nav3h / Google_Password_SwiperLinks
This project is a C++ application designed to decrypt saved passwords from Google Chrome's 'Login Data' file, utilizing the encrypted key stored in Chrome's 'Local State' file.
☆13Updated last year
Alternatives and similar repositories for Google_Password_Swiper
Users that are interested in Google_Password_Swiper are comparing it to the libraries listed below
Sorting:
- Malware Libraries focused in help Malware Development☆26Updated 2 years ago
- Here i will upload every prynt stealer stub source code and you will discover that is stormkitty 0_0 (I didnt buy anything from prynt whi…☆11Updated 3 years ago
- Sourcecode of Infostealer.Dexter POS Malware and C&C☆48Updated 9 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits key☆31Updated 7 years ago
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆30Updated last year
- ⚔️ Red Team tools for capturing credentials & planting payloads using native Windows features.☆10Updated last week
- Red Teaming utilities that I can open source. Used in various tests and CTFS☆12Updated last year
- HEVD Exploits for fun and learning.☆15Updated 5 months ago
- Display Languages Volatile Environment LPE☆12Updated 7 months ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Updated 3 years ago
- Component Services Volatile Environment LPE☆13Updated 7 months ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆29Updated 2 months ago
- Simple keylogger written in C# which is ready for modifications.☆14Updated 4 years ago
- Repository of tools used in my blog☆51Updated last year
- inject and run code into arbitrary process (x86 and x64)☆14Updated 4 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13Updated 3 years ago
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆17Updated 3 years ago
- Joker Botnet Source LEAKED☆10Updated 4 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆24Updated last year
- Enter Product Key Volatile Environment LPE☆13Updated 7 months ago
- Red Teaming Tactics and Techniques☆13Updated 3 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆33Updated 6 years ago
- Linux Malware creator to attack Windows System via Reverse Shell with FindWindow Process Code Injection☆19Updated 2 years ago
- Threat Hijacking Simple Implementation☆18Updated 11 months ago
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆50Updated 4 years ago
- Modular framework to exploit UPS devices☆65Updated 2 years ago
- Generate Professional Phishing Emails Templates Fast And Easy☆14Updated 5 years ago
- Automate Blind SQL Injection with Python.☆22Updated 3 years ago
- Phishable is a project that logs misconfigured DNS that can be exploited to conduct phishing attacks & spoof domains. Phishable helps org…☆21Updated 2 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Updated 3 years ago