Dumping App Bound Protected Credentials & Cookies Without Privileges.
☆96Nov 1, 2025Updated 4 months ago
Alternatives and similar repositories for ZeroCrumb
Users that are interested in ZeroCrumb are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Grab Discord tokens, Chrome passwords and cookies, and more☆31Nov 4, 2025Updated 4 months ago
- An automated bitcoin wallet generator that brute forces random wallet addresses by checking their balance against an offline database.☆29Nov 4, 2025Updated 4 months ago
- ☆20Sep 6, 2025Updated 6 months ago
- Binary Ninja Plugins to work with Unpac.Me unpacking service☆12Apr 24, 2025Updated 11 months ago
- Reflective PE loader written in Zig. Loads and executes native and .NET PE files directly from memory.☆18Mar 2, 2026Updated 3 weeks ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Repository focused on advanced Red Team tools and techniques, mainly created with C. It contains projects I have created to understand ma…☆20Updated this week
- Modified version of PEAS client for offensive operations☆50Nov 1, 2025Updated 4 months ago
- This cheatsheet maps common impacket workflows to their modern alternatives☆56Mar 16, 2026Updated last week
- forgive me :3☆34Jan 1, 2026Updated 2 months ago
- PowerShell tool for auditing Microsoft Entra ID Conditional Access policies and MFA compliance☆37Aug 2, 2025Updated 7 months ago
- Dump protected files (SAM,SYSTEM,SECURITY) by parsing the raw NTFS partition☆38Nov 11, 2025Updated 4 months ago
- Rich Presence GeForce NOW for Discord. Automatically show your games as real presence on Discord. Detect games on Discord using GeForce N…☆38Mar 18, 2026Updated last week
- A multi-platform CI/CD vulnerability detection and attack automation tool for identifying security weaknesses in pipeline configurations.☆101Mar 17, 2026Updated last week
- Step-by-step documentation on how to decrypt SCCM database secrets offline☆50Oct 20, 2025Updated 5 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Executing Shellcode with ReadDirectoryChanges’s Hidden Callback☆30Oct 13, 2025Updated 5 months ago
- The PoC for CVE-2025-70795 / CVE-2026-0828 and updated driver☆41Mar 13, 2026Updated 2 weeks ago
- Shellcode and In-PowerShell solution for patching AMSI via Page Guard Exceptions☆64Nov 15, 2025Updated 4 months ago
- ☆51Nov 26, 2025Updated 4 months ago
- A Just-In-Time Decrypter for Windows executables (x86 and x64) that performs real-time, instruction-level decryption of encrypted code se…☆54Nov 3, 2025Updated 4 months ago
- Minimalistic HTTP(S) client for the NT kernel☆62Dec 1, 2025Updated 3 months ago
- Living Off The Land API☆58Feb 2, 2026Updated last month
- proper ntdll .text section unhooking via native api. unlike other unhookers this doesnt leave 2 ntdlls loaded. x86/x64/wow64 supported.☆53Dec 9, 2025Updated 3 months ago
- ☆27Nov 24, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Manage Shadows Copies via the VSS API using C#, C++, Crystal or Python. Working on Windows 11☆84Jan 26, 2026Updated 2 months ago
- ☆76Jan 1, 2026Updated 2 months ago
- AdobeAllInOne is a comprehensive suite of creative software tools developed by Adobe. It includes a range of applications for design, pho…☆24Apr 9, 2024Updated last year
- A black-box scanner for HTTP request smuggling vulnerabilities caused by chunk parsing discrepancies.☆32Oct 29, 2025Updated 4 months ago
- A portable C# utility for enumerating local and remote windows sessions☆57Jan 1, 2026Updated 2 months ago
- PowerShell collector for adding SCCM attack paths to BloodHound with OpenGraph☆80Mar 13, 2026Updated 2 weeks ago
- Implementing Ghostly-Hollowing using tampered syscalls for remote PE injection☆72Dec 26, 2025Updated 3 months ago
- Leaking kernel addresses from ETW consumers. Requires Administrator privileges.☆92Nov 6, 2025Updated 4 months ago
- Block Windows Defender by deny ACL☆88Jan 12, 2026Updated 2 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Advanced WinRAR Path Traversal Exploit Tool for CVE-2025-8088☆55Aug 18, 2025Updated 7 months ago
- Proof of concept for Kerberos Armoring abuse.☆82Dec 12, 2025Updated 3 months ago
- BYOVD hunter to help prioritize windows drivers worth manual analysis☆127Aug 19, 2025Updated 7 months ago
- Microsoft Network Service Fingerprinting Tool☆69Jan 2, 2026Updated 2 months ago
- ☆137Mar 13, 2026Updated 2 weeks ago
- a BOF implementation of various registry persistence methods☆96Nov 11, 2025Updated 4 months ago
- Automated DLL Hijacking Discovery, Validation, and Confirmation. Turning local misconfigurations into weaponized, confirmed attack paths.☆231Mar 13, 2026Updated 2 weeks ago