Python script to decrypt saved Chrome usernames and passwords on windows
☆287Apr 11, 2021Updated 4 years ago
Alternatives and similar repositories for chrome-decrypter
Users that are interested in chrome-decrypter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Spoofs a DHCP server and exploits all clients vulnerable to the 'ShellShock' bug☆86Mar 27, 2019Updated 7 years ago
- A collection of modifed PowerShell Scripts for CrackMapExec (https://github.com/byt3bl33d3r/CrackMapExec)☆56Mar 26, 2019Updated 7 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Jan 20, 2020Updated 6 years ago
- Converts a command to a base64 powershell compatible string☆27Jul 31, 2014Updated 11 years ago
- A collection of curated Java Deserialization Exploits☆11May 22, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Automatically get internetz from access points that have MAC based filtering enabled☆57Apr 5, 2018Updated 7 years ago
- Active Directory information dumper via LDAP☆13Mar 5, 2020Updated 6 years ago
- Automatically exported from code.google.com/p/hookme☆13Oct 8, 2015Updated 10 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Mar 5, 2020Updated 6 years ago
- Downloads shellcode over HTTP and executes in memory. Now with threading! Rejoice!☆22Sep 16, 2015Updated 10 years ago
- Optional plugins for MITMf☆17Dec 16, 2014Updated 11 years ago
- Modern problems require modern solutions☆32Nov 22, 2022Updated 3 years ago
- A mirror of the original SSLstrip+ code by Leonardo Nve☆183Jun 29, 2018Updated 7 years ago
- Automatically exported from code.google.com/p/jamaal-re-tools☆13Oct 4, 2015Updated 10 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆14Feb 9, 2015Updated 11 years ago
- Python clone of arpspoof that can poison hosts via arp-requests as well as arp-replies☆199Jan 8, 2019Updated 7 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆79May 18, 2017Updated 8 years ago
- Empire is a PowerShell and Python 3.x post-exploitation framework.☆18Aug 6, 2020Updated 5 years ago
- Miscellaneous tools for BloodHound☆19Jan 26, 2022Updated 4 years ago
- Advanced Controller/Server/Client Reverse Shell/Bot – Windows/Linux – Python☆69Feb 20, 2016Updated 10 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆148Jan 30, 2021Updated 5 years ago
- A PoC backdoor that uses Gmail as a C&C server☆1,350Nov 16, 2018Updated 7 years ago
- A cross-platform stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆26Aug 9, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Slides from various talks that I've given over the years☆118Aug 14, 2023Updated 2 years ago
- A collection of Ansible Playbooks that configure Kali to use Fish & install a number of tools☆164Oct 21, 2019Updated 6 years ago
- Uses Empire's (https://github.com/BC-SECURITY/Empire) RESTful API to automate gaining Domain and/or Enterprise Admin rights in Active Dir…☆1,624Jan 23, 2024Updated 2 years ago
- Next Generation of White Chapel☆21Oct 17, 2014Updated 11 years ago
- Converts a USB Rubber ducky script into a Kali Nethunter friendly format for the HID attack☆146Feb 12, 2015Updated 11 years ago
- Impersonate Logged In Accounts & Execute Commands☆35Sep 2, 2014Updated 11 years ago
- Cross Distribution Exploit Testing☆28Sep 23, 2015Updated 10 years ago
- POC of code that downloads and executes shellcode in memory.☆80May 25, 2014Updated 11 years ago
- Useful Windows and AD tools☆15Feb 20, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Toolbox containing research notes & PoC code for weaponizing .NET's DLR☆527Jan 21, 2022Updated 4 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆33Mar 2, 2021Updated 5 years ago
- Veil-Pillage is a post-exploitation framework that integrates with Veil-Evasion.☆159Dec 9, 2015Updated 10 years ago
- Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to …☆762Sep 23, 2024Updated last year
- Lazykatz is an automation developed to extract credentials from remote targets protected with AV and/or application whitelisting software…☆200Nov 19, 2017Updated 8 years ago
- Framework for Man-In-The-Middle attacks☆3,636Aug 28, 2018Updated 7 years ago
- ☆83Jan 29, 2016Updated 10 years ago