breakpointHQ / chrome-banditLinks
Programmatically extract saved passwords from Chromium based browsers.
☆124Updated 3 years ago
Alternatives and similar repositories for chrome-bandit
Users that are interested in chrome-bandit are comparing it to the libraries listed below
Sorting:
- CVE-2020-20093; 20094; 20095; 20096, 2022-28345 RTLO Injection URI Spoofing☆89Updated last year
- Automatically run and save ffuf scans for multiple IPs☆81Updated last year
- ScanMan is the amalgamation of Masscan, Metasploit Framework (MSF) and Nmap Scripting Engine (NSE).☆51Updated 4 months ago
- Super organized and flexible script for sending phishing campaigns☆55Updated 3 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- A Red Team tool for exfiltrating sensitive data from Confluence pages.☆113Updated 2 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆108Updated last year
- Slackhound allows red and blue teams to perform fast reconnaissance on Slack workspaces/organizations to quickly search user profiles, lo…☆83Updated 2 months ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆102Updated 5 years ago
- Man in the Browser Framework☆50Updated 9 months ago
- Red Team tool for exfiltrating files from a target's Google Drive that you have access to, via Google's API.☆59Updated 4 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 3 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆114Updated 3 years ago
- Google Meet Phishing Template For Gophish☆46Updated 3 years ago
- Open-Source Collection of Social Engineering Pretexts☆141Updated last year
- autocrack adds queue support for hashcat cracking.☆41Updated 2 years ago
- spk aka spritzgebaeck: A small OSINT/Recon tool to find CIDRs that belong to a specific organization.☆84Updated 4 months ago
- Creates and sends fake meeting invite☆71Updated 4 years ago
- RedDrop is a quick and easy web server for capturing and processing encoded and encrypted payloads and tar archives.☆57Updated 9 months ago
- A tool to find redirection chains in multiple URLs☆80Updated 9 months ago
- An AV exclusion enumeration tool written in Python.☆59Updated 3 years ago
- Phish password protected Excel-Files☆105Updated last year
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 10 months ago
- CLI & library to search for default credentials among thousands of Products / Vendors☆68Updated 4 years ago
- A Red Team tool for exfiltrating sensitive data from Jira tickets.☆87Updated 2 years ago
- A proof-of-concept script to conduct a phishing attack abusing Microsoft 365 OAuth Authorization Flow☆103Updated 4 years ago
- Basic Dart reverse shell code☆21Updated last year
- Python resource library for creating security related tooling☆79Updated last year
- Passive reconnaissance/enumeration of interesting targets by watching for SSL certificates being issued☆68Updated 3 years ago
- Rodan Exploitation Framework☆102Updated 3 years ago