A python application to steal chrome data and push it back to you.
☆19May 10, 2020Updated 5 years ago
Alternatives and similar repositories for Chrome_pass_stealer
Users that are interested in Chrome_pass_stealer are comparing it to the libraries listed below
Sorting:
- Im a free fire max I'd hacker I'm hack all tipes of IDs fb and google☆32May 8, 2023Updated 2 years ago
- Simple Google Chrome stealer, sends passwords via Telegram into private channel☆46Jun 12, 2018Updated 7 years ago
- Get/dump chrome and firefox saved passwords.☆20Sep 13, 2020Updated 5 years ago
- Crypter For Malware and Stealer☆33Apr 10, 2020Updated 5 years ago
- Ro3b - Advance Banking HTTP Botnet☆50Jun 12, 2023Updated 2 years ago
- pen testing scripts☆12Feb 7, 2021Updated 5 years ago
- Extended Bitcoin Clipper from Nyan Cat☆32Aug 15, 2020Updated 5 years ago
- 🚀Steal Tdata from PC (FTP)☆16May 19, 2020Updated 5 years ago
- Powerful WiFi Hacking penetration testing tools for Linux, designed for ethical hacking, security testing, and network auditing.☆16Nov 18, 2025Updated 3 months ago
- Simple class to search and upload files☆28Aug 13, 2019Updated 6 years ago
- Recopilación de Reglas y Diccionarios para Password Cracking☆29May 2, 2019Updated 6 years ago
- ☆13Jul 13, 2020Updated 5 years ago
- This is my custom wordlist for WiFi passwords, tailored specifically for WiFi networks in Indonesia.☆13Nov 29, 2025Updated 3 months ago
- hack HQ trivia with OCR and google search☆18Dec 7, 2022Updated 3 years ago
- look the repo name☆19Aug 3, 2022Updated 3 years ago
- keylogger + cryptojacking extension chrome and mozilla ,basic malware browser Keylogger capture credentials,IP ,and send inormations to a…☆33Sep 21, 2020Updated 5 years ago
- Step into my GitHub treasure trove—an immersive collection of comprehensive notes chronicling my Certified Ethical Hacker (CEH) lab escap…☆36Aug 13, 2023Updated 2 years ago
- Online Judge that accepts a solution and judges it as Accepted, Compilation Error, Runtime Error, Time Limit Exceeded or Wrong Answer.☆14Mar 10, 2023Updated 3 years ago
- IS2C - CC Cybersecurity Course Notes to help you prepare for the exam☆23Sep 27, 2025Updated 5 months ago
- ☆39Feb 12, 2020Updated 6 years ago
- How to Hack an Android Phone using an Malicious Android Application - Part-2 (More Sophisticated Way)☆11Oct 26, 2021Updated 4 years ago
- Deepwood- is an easy-to-use, Python-based RAT & Stealer, which send info to your webhook. You can recover passwords, aplication data, dis…☆15May 20, 2024Updated last year
- Android backdoored app, improved source code of msfvenom android .apk☆12May 31, 2019Updated 6 years ago
- A framework and build automation tool to process exploits/payloads to evade antivirus and endpoint detection response products using reus…☆11Jan 16, 2024Updated 2 years ago
- Particles (or stars) flowing smoothly in a Perlin Noise field. Very customizable.☆10Nov 24, 2025Updated 3 months ago
- SSH brute-forcing tool written in python☆14Feb 10, 2023Updated 3 years ago
- Open-Source Ransomware Project for learning purpose only written in C# (csharp). Dont use it for bad things.☆88May 2, 2024Updated last year
- Android Miner by bitcoin nova☆37Mar 20, 2018Updated 7 years ago
- steal cookie for chrome and mozilla firefox, use another extension to login with the cookie stealed☆33Mar 25, 2021Updated 4 years ago
- Google Hack Database Web Site Scrapper w/ DB updater utility. ASP.NET MVC web utility and Windows application for generating google hack …☆11Jun 23, 2016Updated 9 years ago
- great android hacking app -enjoy hacking your friends and remember am always never responsible for your malicious activities☆11Jan 19, 2018Updated 8 years ago
- NodeJS based server of LogiMusic Project☆10Jan 20, 2024Updated 2 years ago
- Get latest Exploit Databases notification on your Desktop☆16Jan 29, 2020Updated 6 years ago
- ☆14Feb 27, 2025Updated last year
- javascript botnet browser V3 based one Cloud 9 Botnet and my botnet browser chrome. capture any web site,virtual clavier ,paypal,facebook…☆10Sep 12, 2020Updated 5 years ago
- Financial Applications Features - Security Guidelines (FAFSG) is a set of two FREE checklists created to provide guidelines on the securi…☆12Aug 23, 2021Updated 4 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- Google hacking☆11Apr 26, 2023Updated 2 years ago
- A telegram bot to provide translated output for the received message.☆10Dec 12, 2020Updated 5 years ago