Decrypt Chromium based browser passwords with PowerShell.
☆135Nov 14, 2025Updated 4 months ago
Alternatives and similar repositories for Invoke-PowerChrome
Users that are interested in Invoke-PowerChrome are comparing it to the libraries listed below
Sorting:
- Dumping LSASS Evaded Endpoint Security Solutions☆18Feb 15, 2025Updated last year
- Impacket☆50Feb 25, 2026Updated 3 weeks ago
- [EMNLP 2024] Holistic Automated Red Teaming for Large Language Models through Top-Down Test Case Generation and Multi-turn Interaction☆17Nov 9, 2024Updated last year
- A tool to work with all types of Kerberos delegations (unconstrained, constrained, and resource-based constrained delegations) in Active …☆215Jan 12, 2026Updated 2 months ago
- Azure apim mini proxy☆54Feb 16, 2026Updated last month
- PICO-Implant is a Proof of Concept C2 implant built using Position-independent Code Objects (PICO) for modular functionality. This projec…☆48Nov 9, 2025Updated 4 months ago
- Bof of RegPwn by MDSec☆72Updated this week
- ☆176Oct 21, 2025Updated 4 months ago
- ⚠️ Malware Development training ⚠️☆40Feb 24, 2025Updated last year
- Repository focused on advanced Red Team tools and techniques, mainly created with C. It contains projects I have created to understand ma…☆19Updated this week
- A small set of Beacon Object Files (BOFs) that I developed over the time with a Magic: The Gathering theme.☆18Jul 15, 2025Updated 8 months ago
- Agent for AdaptixC2 with focus in evasion, capability and malleable.☆172Updated this week
- Selective In-Memory Syscall Unhooking, a stealthy method to bypass user-mode hooks in ntdll.dll☆36Mar 11, 2026Updated last week
- SpicyAD is a C# Active Directory penetration testing tool designed for authorized security assessments. It combines multiple AD attack te…☆99Dec 23, 2025Updated 2 months ago
- A basic Android background service that connects to a remote server, executes commands, and returns encrypted output. Disguised as a syst…☆21Aug 2, 2025Updated 7 months ago
- InstantCrack es un motor de recuperación de hashes de alto rendimiento diseñado para realizar búsquedas instantáneas en bases de datos pr…☆25Jan 19, 2026Updated 2 months ago
- AWS Access Review is a comprehensive, zero-configuration security assessment tool that automatically evaluates your AWS environment for p…☆23Apr 6, 2025Updated 11 months ago
- A red teaming attack paradigm against AI Agents☆32Mar 9, 2025Updated last year
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆44Dec 7, 2024Updated last year
- C++ tool and library for converting .bin files to shellcode in multiple output formats.☆34Aug 18, 2025Updated 7 months ago
- A C# utility for interacting with SCOM☆96Dec 2, 2025Updated 3 months ago
- A C# tool for extracting information from SCCM PXE boot media.☆51Jan 14, 2026Updated 2 months ago
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆86Oct 20, 2025Updated 4 months ago
- Automagically decode DNS Exfiltration queries to convert Blind RCE into proper RCE via Burp Collaborator☆20Jan 7, 2026Updated 2 months ago
- ☆18Jan 9, 2025Updated last year
- A portable C# utility for enumerating local and remote windows sessions☆57Jan 1, 2026Updated 2 months ago
- Tiny and fast port scanner (Sliver edition)☆28Feb 17, 2026Updated last month
- A Vulnerablity Radar That Runs With GIthub Actions☆45Mar 12, 2026Updated last week
- A simple research-focused AES-based shellcode loader demonstrating in-memory execution and NTAPI techniques to help understand how custom…☆38Feb 19, 2026Updated last month
- Tool to enumerate privileged Scheduled Tasks on Remote Systems☆288Jan 12, 2026Updated 2 months ago
- Your perfect recognition for HTMLi and XSS☆19Oct 14, 2024Updated last year
- Cisco IOS Security Inspector☆39Dec 29, 2025Updated 2 months ago
- Offline AI Security Assistant for Air-Gapped Pentesting☆72Feb 22, 2026Updated 3 weeks ago
- a minimalistic winrm client written in python☆25Mar 6, 2026Updated last week
- Python based GUI for browsing LDAP☆181Dec 7, 2025Updated 3 months ago
- A penetration testing Swiss Army Knife that's suitable for CTF challenges, bug bounty hunting and red team assessments.☆32Updated this week
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆116Mar 8, 2026Updated last week
- Dev_Display 💻🚀 An awesome Portfolio template to showcase your skills , works & p…☆19Nov 17, 2023Updated 2 years ago
- 🎮 AI-powered solo mode for Backdoors & Breaches. Train incident response skills anytime with an LLM Incident Master. Arcade-themed fork …☆28Dec 27, 2025Updated 2 months ago