ScribblerCoder / BrowserThiefLinks
Powershell script that extracts and steals browser-saved passwords
☆19Updated 2 years ago
Alternatives and similar repositories for BrowserThief
Users that are interested in BrowserThief are comparing it to the libraries listed below
Sorting:
- PowerShell Obfuscator☆226Updated 5 months ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆82Updated last year
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆68Updated last year
- Living Off The Land (LOTL) persistent Reverse shell☆104Updated 2 years ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆138Updated last year
- Polymorphic Command & Control☆102Updated 10 months ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆143Updated 3 years ago
- ☆25Updated last year
- This simple but powerful script will introduce a new type of malware that will turn off the firewall, start an HTTP server, forward its p…☆59Updated last year
- Persistent Powershell backdoor tool {😈}☆122Updated last year
- CLI & library to search for default credentials among thousands of Products / Vendors☆55Updated 3 weeks ago
- EyeSpy is a PowerShell tool for finding IP Cameras and spraying credentials at the underlying RTSP streams if present.☆92Updated 2 weeks ago
- LazyOwn RedTeam/APT Framework is the first RedTeam Framework with an AI-powered C&C, featuring rootkits to conceal campaigns, undetectabl…☆148Updated 2 months ago
- This project is aimed at freely providing technical guides on various hacking tools.☆117Updated last year
- Hide an IP address in scripts using hex/decimal/octal conversions☆72Updated 9 months ago
- Collection of script templates to create infinite UAC prompts forcing a user to run as admin ⚠☆117Updated last week
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆117Updated 2 years ago
- ☆106Updated last year
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆180Updated last year
- A PowerShell-based malware designed to completely disable all Windows security features, featuring UAC bypass and advanced anti-virtualiz…☆63Updated 8 months ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆90Updated last year
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆136Updated last year
- 🐢 Multiple Reverse Shell Handler | Stage 0/1 C2 Framework. Enhances Shell functionality and generates obfuscated powershell payload. Sup…☆17Updated 2 months ago
- The Havoc Framework☆63Updated 3 years ago
- A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse …☆118Updated 2 years ago
- Repo containing cracked red teaming tools.☆216Updated 2 months ago
- PDF dropper Red Team Scenairos☆228Updated last year
- Red Teaming tools and techniques☆56Updated 2 years ago
- This is an advanced ASMI bypass that is currently undetected by Windows Defender and all the Antivirus software's on virustotal.☆25Updated 7 months ago
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆144Updated last year