byt3bl33d3r / chrome-decrypterView external linksLinks
Python script to decrypt saved Chrome usernames and passwords on windows
☆286Apr 11, 2021Updated 4 years ago
Alternatives and similar repositories for chrome-decrypter
Users that are interested in chrome-decrypter are comparing it to the libraries listed below
Sorting:
- Spoofs a DHCP server and exploits all clients vulnerable to the 'ShellShock' bug☆87Mar 27, 2019Updated 6 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆57Apr 5, 2018Updated 7 years ago
- Downloads shellcode over HTTP and executes in memory. Now with threading! Rejoice!☆22Sep 16, 2015Updated 10 years ago
- A collection of modifed PowerShell Scripts for CrackMapExec (https://github.com/byt3bl33d3r/CrackMapExec)☆56Mar 26, 2019Updated 6 years ago
- A collection of curated Java Deserialization Exploits☆11May 22, 2018Updated 7 years ago
- Converts a command to a base64 powershell compatible string☆27Jul 31, 2014Updated 11 years ago
- Automatically exported from code.google.com/p/hookme☆13Oct 8, 2015Updated 10 years ago
- Optional plugins for MITMf☆17Dec 16, 2014Updated 11 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Jan 20, 2020Updated 6 years ago
- A mirror of the original SSLstrip+ code by Leonardo Nve☆183Jun 29, 2018Updated 7 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Mar 5, 2020Updated 5 years ago
- Active Directory information dumper via LDAP☆13Mar 5, 2020Updated 5 years ago
- SMBMap is a handy SMB enumeration tool☆38Jun 18, 2024Updated last year
- Modern problems require modern solutions☆32Nov 22, 2022Updated 3 years ago
- Automatically exported from code.google.com/p/jamaal-re-tools☆13Oct 4, 2015Updated 10 years ago
- A cross-platform stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆26Aug 9, 2019Updated 6 years ago
- Empire is a PowerShell and Python 3.x post-exploitation framework.☆18Aug 6, 2020Updated 5 years ago
- Python clone of arpspoof that can poison hosts via arp-requests as well as arp-replies☆198Jan 8, 2019Updated 7 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆79May 18, 2017Updated 8 years ago
- Miscellaneous tools for BloodHound☆19Jan 26, 2022Updated 4 years ago
- Advanced Controller/Server/Client Reverse Shell/Bot – Windows/Linux – Python☆68Feb 20, 2016Updated 9 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆148Jan 30, 2021Updated 5 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆14Feb 9, 2015Updated 11 years ago
- A PoC backdoor that uses Gmail as a C&C server☆1,346Nov 16, 2018Updated 7 years ago
- Uses Empire's (https://github.com/BC-SECURITY/Empire) RESTful API to automate gaining Domain and/or Enterprise Admin rights in Active Dir…☆1,621Jan 23, 2024Updated 2 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆33Mar 2, 2021Updated 4 years ago
- Disk Image Mounting Script☆11Jan 22, 2026Updated 3 weeks ago
- Fix Issues with Odysseus working on Linux.☆10Feb 9, 2016Updated 10 years ago
- Recursively searches a directory for any file containing a specified string☆48Jul 5, 2015Updated 10 years ago
- POC of code that downloads and executes shellcode in memory.☆80May 25, 2014Updated 11 years ago
- Veil-Pillage is a post-exploitation framework that integrates with Veil-Evasion.☆159Dec 9, 2015Updated 10 years ago
- Sniffs an interface/pcap file and concatenates fragmented packet loads☆22Feb 26, 2015Updated 10 years ago
- An (unofficial) Odysseus wrapper utility.☆17Jul 14, 2015Updated 10 years ago
- Some NSE scripts to search information from routers☆10Nov 18, 2015Updated 10 years ago
- Next Generation of White Chapel☆21Oct 17, 2014Updated 11 years ago
- Slides from various talks that I've given over the years☆118Aug 14, 2023Updated 2 years ago
- Converts a USB Rubber ducky script into a Kali Nethunter friendly format for the HID attack☆143Feb 12, 2015Updated 11 years ago
- Cross Distribution Exploit Testing☆28Sep 23, 2015Updated 10 years ago
- Toolbox containing research notes & PoC code for weaponizing .NET's DLR☆525Jan 21, 2022Updated 4 years ago