Xeroday / ChromeLoggerLinks
Chrome Keylogger Extension
☆166Updated 10 years ago
Alternatives and similar repositories for ChromeLogger
Users that are interested in ChromeLogger are comparing it to the libraries listed below
Sorting:
- A ctypes powered python keylogger.☆107Updated 6 years ago
- Get all passwords stored by Chrome on WINDOWS.☆176Updated 6 years ago
- A Cross-Platform Forensic Framework for Google Chrome☆71Updated 10 years ago
- Cromos is a tool for downloading legitimate extensions of the Chrome Web Store and inject codes in the background of the application.☆125Updated 8 years ago
- ssh management tool to provides commandline access to a remote system running SSH server☆76Updated 7 years ago
- Python script to decrypt saved Chrome usernames and passwords on windows☆286Updated 4 years ago
- Quickjack is a point-and-click tool for intuitively producing advanced clickjacking and frame slicing attacks.☆244Updated 2 years ago
- PoC Android smart phone botnet☆79Updated 13 years ago
- Simple Bash Rasomware for use in Cyber Exercises☆116Updated 9 years ago
- Bug7sec Team - ransomware open source (web)☆133Updated 8 years ago
- Universal MITM web server☆106Updated 8 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆224Updated 4 years ago
- A python script designed to grab the original url from an adfly url without opening it :D☆57Updated 8 years ago
- Credentials recovery project☆44Updated 9 years ago
- Python code to extract chrome cookie, history and login data files☆59Updated 8 years ago
- A PHP Based Tool That Helps You To Manage All Your Backdoored Websites Efficiently.☆126Updated 2 years ago
- A keystroke logger to exploit XSS vulnerabilities in a site - for my personal Educational purposes only☆171Updated 4 years ago
- Pythonic ransomware proof of concept.☆220Updated 5 years ago
- Borrow CPU cycles from visitor's web browsers to crack MD5 password hashes 😲☆188Updated 5 years ago
- USB Attack to Decrypt Wi-Fi Communications☆32Updated 10 years ago
- A Python program that scans RAM.☆40Updated 11 years ago
- Source code to the Malicious Demon Hunter Exploit Kit☆58Updated 10 years ago
- Take full control of a OSX user or root account via command line.☆100Updated 7 years ago
- Phishing webapp generator☆42Updated 7 years ago
- simple reverse tcp backdoor hack☆63Updated 5 years ago
- Lightweight remote administrative client written in Java.☆73Updated 6 years ago
- an ultimate evidence wiper☆64Updated 10 years ago
- Demo of phishing attack on the native HTML5 full screen API.☆117Updated 12 years ago
- Powershell Reverse Rubber Ducky☆57Updated 10 years ago
- A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines☆29Updated 10 years ago