SilentDev33 / ChromeAppBound-key-injectionLinks
Retrieve the Chrome App Bound key using DLL injection — no administrator privileges required and no need to run from the chrome folder in Program Files
☆27Updated last month
Alternatives and similar repositories for ChromeAppBound-key-injection
Users that are interested in ChromeAppBound-key-injection are comparing it to the libraries listed below
Sorting:
- Decrypting yandex browser passwords☆20Updated last month
- A Free Open sourced crypter that builds a output .NET .exe Stub (Updated whenever I feel like it)☆15Updated last month
- Pattern-based AMSI bypass that patches AMSI.dll in memory by modifying comparison values, conditional jumps, and function prologues to ne…☆18Updated 3 weeks ago
- My POC implementation of HVNC (Hidden VNC / Hidden Desktop)☆23Updated 5 months ago
- Dumping App Bound Protected Credentials & Cookies Without Privileges.☆15Updated last week
- (EDR) Dll Unhooking = kernel32.dll, kernelbase.dll, ntdll.dll, user32.dll, apphelp.dll, msvcrt.dll.☆31Updated 2 weeks ago
- Yandex browser passwords and credit-cards decryption algorithm☆13Updated last month
- Ransomware written in go, encrypt - decrypt.☆22Updated last month
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆66Updated last month
- A lightweight tool that injects a custom assembly proxy into a target process to silently bypass AMSI scanning by redirecting AmsiScanBuf…☆39Updated 3 weeks ago
- Bypassing Major EDR's with staged shellcode, custom getmodulehandleW and getprocaddress, veh syscalls & more.☆20Updated last month
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆84Updated 2 years ago
- A WIP shellcode loader tool which bypasses AV/EDR, coded in C++, and equipped with a minimal builder.☆53Updated last month
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆45Updated last year
- 💎 | RubyRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Ruby☆10Updated last month
- How to bypass AMSI (Antimalware Scan Interface) in PowerShell/C++ by dynamically patching the AmsiScanBuffer function.☆17Updated last month
- ATL.dll and WmiMgmt.msc UAC Bypass☆12Updated last month
- Bypasses AMSI protection through remote memory patching and parsing technique.☆43Updated 3 weeks ago
- Kill malawarebytes process. Can be ported to any programming language.☆10Updated last month
- A keygen for Specter Insight C2☆32Updated 3 months ago
- Unhook Ntdll.dll, Go & C++.☆22Updated last month
- Threadless shellcode injection tool☆64Updated 10 months ago
- The best powershell obfuscator ever made☆109Updated last month
- Crypter/Stub/Downloader for payloads and malware, bypassing all AV and achiving a score of 0/60 detections on virus total☆9Updated last year
- converts sRDI compatible dlls to shellcode☆29Updated 4 months ago
- UAC Bypass via CMUACUtil & PEB Enumeration, Undetected for now.☆48Updated last year
- TypeLib persistence technique☆115Updated 7 months ago
- ☆35Updated 8 months ago
- CSharp reimplementation of Venoma, another C++ Cobalt Strike beacon dropper with custom indirect syscalls execution☆45Updated last year
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆89Updated 11 months ago