Decrypt Chromium based browser passwords with PowerShell.
☆137Mar 31, 2026Updated 3 weeks ago
Alternatives and similar repositories for Invoke-PowerChrome
Users that are interested in Invoke-PowerChrome are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Dumping LSASS Evaded Endpoint Security Solutions☆18Feb 15, 2025Updated last year
- Impacket☆50Feb 25, 2026Updated 2 months ago
- [EMNLP 2024] Holistic Automated Red Teaming for Large Language Models through Top-Down Test Case Generation and Multi-turn Interaction☆17Nov 9, 2024Updated last year
- A tool to work with all types of Kerberos delegations (unconstrained, constrained, and resource-based constrained delegations) in Active …☆216Apr 17, 2026Updated last week
- Azure apim mini proxy☆56Feb 16, 2026Updated 2 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆186Oct 21, 2025Updated 6 months ago
- PICO-Implant is a Proof of Concept C2 implant built using Position-independent Code Objects (PICO) for modular functionality. This projec…☆53Nov 9, 2025Updated 5 months ago
- ☆77Apr 8, 2026Updated 3 weeks ago
- ⚠️ Malware Development training ⚠️☆41Feb 24, 2025Updated last year
- Repository focused on advanced Red Team tools and techniques, mainly created with C. It contains projects I have created to understand ma…☆21Mar 23, 2026Updated last month
- One WSL BOF to rule them all☆175Jan 14, 2026Updated 3 months ago
- A small set of Beacon Object Files (BOFs) that I developed over the time with a Magic: The Gathering theme.☆21Jul 15, 2025Updated 9 months ago
- A basic Android background service that connects to a remote server, executes commands, and returns encrypted output. Disguised as a syst…☆22Aug 2, 2025Updated 8 months ago
- SpicyAD is a C# Active Directory penetration testing tool designed for authorized security assessments. It combines multiple AD attack te…☆101Dec 23, 2025Updated 4 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Bof of RegPwn by MDSec☆118Mar 15, 2026Updated last month
- Selective In-Memory Syscall Unhooking, a stealthy method to bypass user-mode hooks in ntdll.dll☆38Mar 11, 2026Updated last month
- Agent for AdaptixC2 with focus in evasion, capability and malleable.☆195Updated this week
- InstantCrack es un motor de recuperación de hashes de alto rendimiento diseñado para realizar búsquedas instantáneas en bases de datos pr…☆25Jan 19, 2026Updated 3 months ago
- A red teaming attack paradigm against AI Agents☆33Mar 9, 2025Updated last year
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆45Dec 7, 2024Updated last year
- C++ tool and library for converting .bin files to shellcode in multiple output formats.☆34Aug 18, 2025Updated 8 months ago
- A C# utility for interacting with SCOM☆99Dec 2, 2025Updated 4 months ago
- A C# tool for extracting information from SCCM PXE boot media.☆52Jan 14, 2026Updated 3 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆86Oct 20, 2025Updated 6 months ago
- ☆18Jan 9, 2025Updated last year
- Automagically decode DNS Exfiltration queries to convert Blind RCE into proper RCE via Burp Collaborator☆20Jan 7, 2026Updated 3 months ago
- A portable C# utility for enumerating local and remote windows sessions☆57Jan 1, 2026Updated 3 months ago
- Tiny and fast port scanner (Sliver edition)☆30Feb 17, 2026Updated 2 months ago
- Your perfect recognition for HTMLi and XSS☆19Oct 14, 2024Updated last year
- Tool to enumerate privileged Scheduled Tasks on Remote Systems☆294Mar 29, 2026Updated last month
- AWS Access Review is a comprehensive, zero-configuration security assessment tool that automatically evaluates your AWS environment for p…☆23Apr 18, 2026Updated last week
- A simple research-focused AES-based shellcode loader demonstrating in-memory execution and NTAPI techniques to help understand how custom…☆45Feb 19, 2026Updated 2 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Cisco IOS Security Inspector☆39Dec 29, 2025Updated 4 months ago
- Python based GUI for browsing LDAP☆181Dec 7, 2025Updated 4 months ago
- a minimalistic winrm client written in python☆28Apr 17, 2026Updated last week
- Dev_Display 💻🚀 An awesome Portfolio template to showcase your skills , works & p…☆19Nov 17, 2023Updated 2 years ago
- Brute Ratel External C2 (Microsoft Teams)☆38Dec 11, 2024Updated last year
- Offline AI Security Assistant for Air-Gapped Pentesting☆82Apr 19, 2026Updated last week
- Multiplayer pivoting solution☆504Mar 7, 2026Updated last month