bierschi / chromepass
Fetching passwords from the chrome browser database
☆89Updated last year
Alternatives and similar repositories for chromepass:
Users that are interested in chromepass are comparing it to the libraries listed below
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆93Updated last year
- Kali Packerge Manager☆56Updated last year
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆106Updated last year
- ☆94Updated last year
- ☆60Updated 8 months ago
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated 10 months ago
- Python RAT that uses Telegram as C2 endpoint☆25Updated last year
- A powerful tool that utilizes the technique of google dorking to search for specific information on the internet.☆100Updated last year
- Find Email Spoofing Vulnerablity of domains☆93Updated 5 months ago
- 🕵️ OSINT Tool (github tracker)☆132Updated 7 months ago
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆158Updated 10 months ago
- ☆50Updated last year
- Gmail/GSuite account enumeration tool☆50Updated 10 months ago
- PacketSpy☆136Updated 7 months ago
- An OSINT tool tailored for comprehensive collection, analysis, and interpretation of cyber threat intelligence from Telegram channels and…☆79Updated 9 months ago
- Here are +200 different rats some with source code☆83Updated last year
- Evilginx 3 [PHISHLET] LAB by Evi1Grey5 [ CUSTOM CREATION / FREE / DEVELOPMENT / LABORATORY ]☆33Updated this week
- Seekolver is a tool focused on attack-surface mapping. It performs searches for subdomains associated with root domains and root domains …☆40Updated last year
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆130Updated 6 months ago
- Capture screenshots of onion services on an onion service.☆50Updated 7 months ago
- Ready to go Phishing Platform☆36Updated 3 months ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆50Updated 3 months ago
- Living Off The Land (LOTL) persistent Reverse shell☆94Updated last year
- All-sources tool to search websites by favicons☆99Updated 2 months ago
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆29Updated last year
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆58Updated 10 months ago
- hiding in plain sight: part 2☆44Updated 6 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated 5 months ago