Xeroday / ChromeLogger
Chrome Keylogger Extension
☆164Updated 9 years ago
Alternatives and similar repositories for ChromeLogger:
Users that are interested in ChromeLogger are comparing it to the libraries listed below
- A ctypes powered python keylogger.☆104Updated 5 years ago
- Quickjack is a point-and-click tool for intuitively producing advanced clickjacking and frame slicing attacks.☆237Updated last year
- A Cross-Platform Forensic Framework for Google Chrome☆69Updated 9 years ago
- A python script designed to grab the original url from an adfly url without opening it :D☆57Updated 7 years ago
- Python code to extract chrome cookie, history and login data files☆58Updated 7 years ago
- php-cli vulnerability scanner☆79Updated 9 years ago
- PwnSTAR (Pwn SofT-Ap scRipt) - for all your fake-AP needs!☆254Updated 7 years ago
- Proof-of-concept python IRC botnet for orchestrating macOS computers (harmless due to SIP & Gatekeeper)☆83Updated 3 years ago
- A proof-of-concept for a browser-based XSS-deliverable botnet which does not exploit browser vulnerabilities but instead sticks to the st…☆27Updated 10 years ago
- It contains a javascript file and a php file that would embedd a keylogger in XSS Reflected point....☆43Updated 8 years ago
- an ultimate evidence wiper☆64Updated 9 years ago
- Get all passwords stored by Chrome on WINDOWS.☆173Updated 5 years ago
- Hidemyass Proxy Grabber☆87Updated 7 years ago
- Command line go0gle dorking tool☆135Updated 11 years ago
- simple reverse tcp backdoor hack☆63Updated 4 years ago
- Open Source Python Keylogger Collection☆175Updated last year
- Social Engineering Tool Oriented to facebook☆56Updated 7 years ago
- 🐍 Copy passwords from Crome and send them via email,Python && win32crypt☆39Updated 8 years ago
- steal cookies from firefox cookies database(cookies.sqlite)☆55Updated 9 years ago
- A keystroke logger to exploit XSS vulnerabilities in a site - for my personal Educational purposes only☆166Updated 3 years ago
- Python malware for pentesters that bypasses most antivirus (signature and heuristics) and IPS using sheer stupidity☆76Updated 10 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆225Updated 3 years ago
- A simple utility to convert EXE files to JPEG images and vice versa.☆197Updated 9 years ago
- The Hacker's ToolBox☆184Updated 7 years ago
- ssh management tool to provides commandline access to a remote system running SSH server☆76Updated 6 years ago
- BrowserBackdoor is an Electron Application with a JavaScript WebSocket Backdoor and a Ruby Command-Line Listener☆340Updated 2 years ago
- Take full control of a OSX user or root account via command line.☆99Updated 6 years ago
- Credentials recovery project☆44Updated 8 years ago
- PoC Android smart phone botnet☆78Updated 12 years ago
- Poison, reset, spoof, redirect MITM script☆126Updated last year