The-Viper-One / Invoke-PowerChromeLinks
Decrypt Chromium based browser passwords with PowerShell.
☆127Updated 2 weeks ago
Alternatives and similar repositories for Invoke-PowerChrome
Users that are interested in Invoke-PowerChrome are comparing it to the libraries listed below
Sorting:
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆114Updated 4 months ago
- ☆121Updated 6 months ago
- ☆93Updated 10 months ago
- Python alternative to Mimikatz lsadump::dcshadow☆155Updated 5 months ago
- Vast.ai Password Kracking☆89Updated last month
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆79Updated last year
- Most Responder's configuration power in your hand.☆51Updated 10 months ago
- Tool to enumerate privileged Scheduled Tasks on Remote Systems☆199Updated this week
- ☆62Updated last year
- A Havoc UI tool to pivot onto a machine using ligolo-ng☆48Updated last year
- ☆79Updated 7 months ago
- Password spraying tool for Microsoft Online accounts (Entra/Azure/O365)☆66Updated last year
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆181Updated 6 months ago
- ☆161Updated last year
- ☆146Updated 2 months ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆119Updated 10 months ago
- Deploy a phishing infrastructure on the fly.☆78Updated 11 months ago
- Advanced Domain Controller attack and credential analysis tool leveraging DonPAPI database☆249Updated last month
- Just some random Red Team Scripts that can be useful☆153Updated last year
- Inject RDPThief into memory with PowerShell.☆65Updated 10 months ago
- LDAP Enumeration Tool for Pentesters☆48Updated 7 months ago
- New 0 day vulnerability allowing to leak NTLM hashes from browsers with one click☆111Updated 2 weeks ago
- ☆100Updated 9 months ago
- Living off the land searches for explorer and sharepoint☆91Updated 7 months ago
- A python script to automatically list vulnerable Windows ACEs/ACLs.☆62Updated 5 months ago
- A community-driven collection of BloodHound queries☆155Updated last month
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆131Updated 10 months ago
- Simple netexec wraper with html repport☆19Updated last year
- A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its mini…☆132Updated 3 months ago
- Tool for enumerating Active Directory environments☆49Updated 2 years ago