A small program, lists all the stored user name and passwords with urls in Google Chrome.
☆18Oct 21, 2021Updated 4 years ago
Alternatives and similar repositories for chrome-thief
Users that are interested in chrome-thief are comparing it to the libraries listed below
Sorting:
- ☆10May 31, 2021Updated 4 years ago
- A USB RubberDucky payload that steals Wi-Fi credentials and sends them to the attacker via STMP☆10Dec 16, 2021Updated 4 years ago
- Jeopardy, for the folks at home 📺☆10Feb 12, 2024Updated 2 years ago
- an opensource clone of Earthcore: Shattered Elements☆10Jan 27, 2023Updated 3 years ago
- Its the programmed ATM card that can hack into all ATM machines. Its works with any currency and in any country where you might be living…☆10May 15, 2016Updated 9 years ago
- Samy Kamkar's Magspoof using SMD components☆16Dec 1, 2015Updated 10 years ago
- User Recon Find usernames across over 75 social networks This is useful if you are running an investigation to determine the usage of the…☆15Feb 8, 2021Updated 5 years ago
- A list of Free Software network services and web applications which can be hosted locally. Selfhosting is the process of hosting and mana…☆14Jan 3, 2020Updated 6 years ago
- Module PMKIDAttack for WiFi Pineapple☆12Oct 6, 2022Updated 3 years ago
- emv software clone datas DUMPS from original card holder to chip blank card jcop any new generation blank card☆15Oct 25, 2017Updated 8 years ago
- Inject scripted keystrokes and mouse movements into remote desktop sessions, including VMware View, Amazon Workspaces, and Microsoft RDP.…☆16Jul 25, 2014Updated 11 years ago
- Infrared based vein finder.☆12Oct 9, 2018Updated 7 years ago
- ☆11Jun 1, 2018Updated 7 years ago
- Code for the Arduino-based BadUSB inspired from the legendary Rubber Ducky from Hak5☆11Feb 28, 2023Updated 3 years ago
- TV transmitter and receiver through RTL-SDR, for educational purposes☆11Oct 27, 2017Updated 8 years ago
- Magnetic card spoofer☆12May 5, 2014Updated 11 years ago
- PillDucky is similar to "Hak5's Rubber Ducky" but for STM32 boards.☆15Jul 27, 2021Updated 4 years ago
- This is a place for everything UK related☆10Feb 1, 2023Updated 3 years ago
- A collection of small apps that will put shortcuts to various sideloaded android app in your Unknown Sources section of your main library…☆13Jul 27, 2019Updated 6 years ago
- Watch YouTube without any ads! Skip ads prior to the actual video content and blocks any pop-up ads during the video within the frame☆13Feb 25, 2022Updated 4 years ago
- MagTool is software for magnetic stripe readers & writers.☆15Jan 22, 2013Updated 13 years ago
- Keychain USB multiple password manager/generator/injector☆11Dec 7, 2015Updated 10 years ago
- Schematics & Firmware for self-tuning portable RF Jammer☆11Feb 2, 2018Updated 8 years ago
- Play CCGs such as Middle-Earth CCG (MECCG) in your browser. Plain and intuitive.☆11Jan 31, 2024Updated 2 years ago
- Helper library to read out the current balance of canteen cards using NFC.☆12Oct 14, 2024Updated last year
- Deep learning-based audio spoofing attack detection experiments for speaker verification.☆14Apr 20, 2023Updated 2 years ago
- Read & write magnetic card data to magspoof (ATtiny85)☆12May 27, 2019Updated 6 years ago
- Sort your LEGO like a pro☆13Oct 11, 2017Updated 8 years ago
- Evil maid attacks are the biggest threat to full disk encryption, if you can't provide 100% physical security. It's not about locking you…☆11Sep 4, 2016Updated 9 years ago
- Tapping the 'Tmoney' card to the NFC module displays the remaining balance on the OLED screen, offers the most intuitive way to check the…☆18Feb 7, 2026Updated last month
- ☆11Apr 16, 2016Updated 9 years ago
- Most powerfull Wifi Jammier.with fixes.☆13Oct 14, 2022Updated 3 years ago
- This project contains source code of our Nexmon-based jammer app presented as a demo at WiSec 2017.☆18Nov 5, 2021Updated 4 years ago
- Hardware and software for smartphone sensor peripherals using the audio jack interface.☆13Jan 10, 2014Updated 12 years ago
- A simple jamming attack with GNU randio and gaussian noise source☆13Mar 28, 2019Updated 6 years ago
- ☆12Apr 29, 2023Updated 2 years ago
- Read Magnetic stripe data using square card reader☆13Jul 12, 2013Updated 12 years ago
- Man-in-the-middle device for attacking RFID access control systems☆16Feb 7, 2023Updated 3 years ago
- a link-sharing social networking☆10Sep 30, 2021Updated 4 years ago