artemy-ccrsky / EvilChromeExtensionsView external linksLinks
Educational Chrome extensions simulating real-world attacker behavior in the browser. Built for Red Team demos, threat emulation, and adversary simulation scenarios.
☆19Dec 18, 2025Updated last month
Alternatives and similar repositories for EvilChromeExtensions
Users that are interested in EvilChromeExtensions are comparing it to the libraries listed below
Sorting:
- A way to maintain long-term access to Windows LAPS for lateral movement in AD via installing an Offensive LAPS RPC backdoor on a DC.☆29Jun 9, 2025Updated 8 months ago
- poc for cve-2025-53772☆46Dec 10, 2025Updated 2 months ago
- Conti V3 source code updated☆11Jun 30, 2022Updated 3 years ago
- A small WinRM client designed for interacting with JEA endpoints.☆13Aug 29, 2024Updated last year
- Python script to extract embedded data from binaries generated by SAPIEN Script Packager☆12Mar 20, 2024Updated last year
- Use For Testing Only Not For Crime Or Attack Goverment Website☆11Feb 16, 2022Updated 3 years ago
- Malicious Apk For Android☆16Jun 30, 2022Updated 3 years ago
- ☆10Jan 30, 2024Updated 2 years ago
- ☆13May 22, 2023Updated 2 years ago
- Nodemcu lua module to help with driving a unipolar stepper motor 28BYJ-48 when using ULN2003 IC☆13Oct 24, 2020Updated 5 years ago
- Find world writable directories that contain a .exe or .dll file☆13Aug 31, 2021Updated 4 years ago
- Simple micro service for provide placeholders (or skeletons) for large images on any website or mobile apps☆15Jul 26, 2020Updated 5 years ago
- Superpower the angular superdevs with the best and easy to use tools for get up and running instantly creating wonderful dapps on Ethereu…☆15Jun 4, 2024Updated last year
- CVE-2025-55182 React Server Components Remote Code Execution Exploit Tool☆41Dec 5, 2025Updated 2 months ago
- Welcome to the Pressidium® Yara Rules repository. This section contains a carefully curated collection of Yara rules specifically designe…☆15Nov 5, 2023Updated 2 years ago
- Code of Truman: Constructing Device Behavior Models from OS Drivers to Fuzz Virtual Devices (NDSS 2025)☆23Apr 11, 2025Updated 10 months ago
- Telegram for Android source☆14Oct 15, 2025Updated 3 months ago
- Boilerplate to create powerful frontend applications☆18Oct 3, 2018Updated 7 years ago
- Створення бінарника AppImage з AceStream Media☆15Oct 6, 2025Updated 4 months ago
- Simple tool to scrape acestream links from HTML content☆18Feb 2, 2026Updated last week
- A Burp Suite extension for GraphQL security testing.☆38Feb 7, 2026Updated last week
- ☆19Mar 25, 2025Updated 10 months ago
- Webpack plugin and utilities to pass environment variables from server to client☆17Mar 19, 2025Updated 10 months ago
- Angularjs dynamic background module, generate and change element background on the fly - http://720kb.github.io/angular-background☆16Mar 23, 2017Updated 8 years ago
- A tweak to restore functionality to older Twitter versions for iOS/iPadOS.☆29Nov 4, 2025Updated 3 months ago
- A script that sends keypresses to a server that can be injected into XSS-vulnerable websites.☆25Nov 18, 2016Updated 9 years ago
- Manage RunCat localization srtings.☆26Jan 25, 2026Updated 3 weeks ago
- Use normal web pentest tools to hack Websockets☆18Sep 23, 2019Updated 6 years ago
- 🔭 QuipuSwap SDK for JavaScript.☆19Sep 5, 2023Updated 2 years ago
- ☆16Jan 5, 2017Updated 9 years ago
- Create production-ready Tezos smart contracts with just one command☆17Jan 24, 2023Updated 3 years ago
- Simple GTK tetris game (port for kindle)☆16May 6, 2022Updated 3 years ago
- Garmin ConnectIQ data field for a round display like the Fenix3 watch☆17Apr 10, 2015Updated 10 years ago
- Vulnerability scanner for Caido☆36Feb 7, 2026Updated last week
- Python Client to LeakIX API☆21Updated this week
- Code to disrupt the Tox network for hardening/testing purposes.☆37Sep 12, 2014Updated 11 years ago
- This website is a collection of content that can be used to help Ukraine in the Cyber War from your browser, it also contains WebApps, Ne…☆16May 8, 2024Updated last year
- It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography …☆20May 23, 2022Updated 3 years ago
- ☆19Aug 29, 2024Updated last year