ShorterKing / Chrome-Passwords-decryptView external linksLinks
This script will not work with the latest version of chrome
☆13May 11, 2025Updated 9 months ago
Alternatives and similar repositories for Chrome-Passwords-decrypt
Users that are interested in Chrome-Passwords-decrypt are comparing it to the libraries listed below
Sorting:
- RE for champions☆15Jan 28, 2026Updated 2 weeks ago
- This repository contains my complete resources and coding practices for malware development using Rust 🦀.☆16Jan 15, 2025Updated last year
- Plugin for ida pro that copies RVA under cursor to clipboard.☆16Jul 28, 2023Updated 2 years ago
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 8 months ago
- Detect BypassUAC using AMSI☆29Feb 18, 2025Updated 11 months ago
- A replication of the Baldur's Gate 3 Script Extender for MacOS☆22Feb 8, 2026Updated last week
- POC usermode <=> kernel communication via ALPC.☆70Jun 6, 2024Updated last year
- CTF binary exploit code☆37Apr 7, 2019Updated 6 years ago
- headless-ida-mcp-server☆28Apr 4, 2025Updated 10 months ago
- A comprehensive repository for malware analysis and threat intelligence, including Cobalt Strike Beacon configurations, YARA rules, IOCs,…☆14Oct 23, 2025Updated 3 months ago
- Python infrastructure to train paths selectors for symbolic execution engines.☆11Updated this week
- Mitre ATT&CK and Suricata Rules Automation with AI & LLM☆14Sep 28, 2024Updated last year
- Red-Team - AI Agent to Phish Employees based on Social Intelligence.☆22Dec 28, 2025Updated last month
- Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813)☆95Apr 2, 2025Updated 10 months ago
- ☆41Jul 9, 2020Updated 5 years ago
- ☆12Dec 10, 2023Updated 2 years ago
- A small tool to unmap PE memory dumps.☆11Nov 9, 2023Updated 2 years ago
- SharpCoercer is a .NET 4.8 C# tool that leverages 16 different RPC-based coercion methods to force remote Windows hosts to authenticate t…☆55Jul 13, 2025Updated 7 months ago
- ☆12Aug 15, 2024Updated last year
- Code and artifacts of the "Dissecting American Fuzzy Lop - A FuzzBench Evaluation" paper☆13Oct 3, 2022Updated 3 years ago
- It exploits the chrome vulnerability and gets the all saved credentials in chrome☆10Jun 22, 2020Updated 5 years ago
- Blocking Windows EDR agents by registering an own IPC-object in the Object Manager’s namespace (CVE-2023-3280, CVE-2024-5909, CVE-2024-20…☆33Feb 27, 2025Updated 11 months ago
- My Personal Kernel-Mode Process dumper☆13Feb 18, 2024Updated last year
- SanitizerCoverage hooks and coverage reports for user-mode QEMU☆12Nov 3, 2019Updated 6 years ago
- Used to grab banners from TCP services and search their contents for a specific string.☆16Feb 11, 2020Updated 6 years ago
- Compiler Fingerprinting☆14Apr 24, 2015Updated 10 years ago
- ☆12Jun 8, 2021Updated 4 years ago
- This AI agent analyzes code repositories, detects potential security vulnerabilities, reviews code quality, and suggests fixes based on S…☆12Feb 6, 2025Updated last year
- A Universal 32-bit iBoot patcher for iPhone OS 2.0 --> iOS 10☆11Mar 11, 2020Updated 5 years ago
- A Python client for the Global CVE Allocation System.☆17Jan 31, 2026Updated 2 weeks ago
- AMSI Bypass Via the Heap☆107Nov 20, 2020Updated 5 years ago
- 编译时使用7z压缩指定so到assets目录,并在运行时解压执行.达到压缩apk体积☆14Dec 12, 2019Updated 6 years ago
- Minecraft 1.20.2 hacked client base☆10Mar 6, 2024Updated last year
- Collection of malware ioc hashes from blog posts. A Python script is provided to search through it.☆19Sep 10, 2020Updated 5 years ago
- A tool which tries to map CVEs from NVD to packages in supported ecosystems (Maven, NPM, PyPI).☆12Jul 12, 2025Updated 7 months ago
- [NAACL 2025] LLM-Supported Natural Language to Bash Translation☆16Jul 17, 2025Updated 6 months ago
- Puppeteer Recaptcha solver☆10Jan 10, 2024Updated 2 years ago
- ☆15May 6, 2021Updated 4 years ago
- This mod on 1.12.2 steals the entered passwords (Entered via /login)☆12May 24, 2022Updated 3 years ago