A Chrome extension that will steal literally everything it can
☆724Mar 8, 2024Updated 2 years ago
Alternatives and similar repositories for spy-extension
Users that are interested in spy-extension are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- privilege escalation by piggy-backing user sudo requests☆16Feb 6, 2023Updated 3 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Mar 26, 2023Updated 3 years ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆183Jun 9, 2024Updated last year
- Black Angel is a Windows 11/10 x64 kernel mode rootkit. Rootkit can be loaded with enabled DSE while maintaining its full functionality.☆683Nov 9, 2023Updated 2 years ago
- Infect Shared Files In Memory for Lateral Movement☆192Dec 14, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A VSCode devcontainer for development of COFF files with batteries included.☆49Jul 10, 2023Updated 2 years ago
- Repository contains psexec, which will help to exploit the forgotten pipe☆174Nov 5, 2024Updated last year
- Automated Persistence and Lateral Movement using GCP Patch Management☆16Aug 11, 2022Updated 3 years ago
- A C# tool to output crackable DPAPI hashes from user MasterKeys☆140Sep 14, 2024Updated last year
- FrostByte is a POC project that combines different defense evasion techniques to build better redteam payloads☆383Apr 16, 2022Updated 4 years ago
- ☆569Mar 28, 2024Updated 2 years ago
- Analyse your malware to surgically obfuscate it☆527Dec 17, 2025Updated 4 months ago
- The Definitive Guide To Process Cloning on Windows☆543Jan 3, 2024Updated 2 years ago
- This is a repo containing several osint sources☆143Jul 6, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- JavaScript payload and supporting software to be used as XSS payload or post exploitation implant to monitor users as they use the target…☆436Mar 28, 2026Updated 3 weeks ago
- ☆173Jul 27, 2024Updated last year
- macOS shellcode loader written in Objective-C☆48Jul 15, 2022Updated 3 years ago
- ☆61Oct 24, 2024Updated last year
- Kraken, a modular multi-language webshell coded by @secu_x11☆551Feb 10, 2024Updated 2 years ago
- Reproducing Spyboy technique to terminate all EDR/XDR/AVs processes☆1,050Jun 20, 2023Updated 2 years ago
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆101Feb 28, 2023Updated 3 years ago
- Some Rust program I wrote while learning Malware Development☆161Feb 4, 2025Updated last year
- The Token Stealer☆514Jul 13, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Shoggoth: Asmjit Based Polymorphic Encryptor☆783Apr 4, 2026Updated 2 weeks ago
- Local & remote Windows DLL Proxying☆174Jun 17, 2024Updated last year
- .NET/PowerShell/VBA Offensive Security Obfuscator☆518Feb 1, 2024Updated 2 years ago
- BOF implementation of @_EthicalChaos_'s ThreadlessInject project. A novel process injection technique with no thread creation, released a…☆395Jan 9, 2024Updated 2 years ago
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆790Jan 26, 2026Updated 2 months ago
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆1,129Jun 10, 2024Updated last year
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆673Dec 23, 2022Updated 3 years ago
- This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"☆29May 1, 2018Updated 7 years ago
- laZzzy is a shellcode loader, developed using different open-source libraries, that demonstrates different execution techniques.☆502Jan 10, 2023Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,376Oct 27, 2023Updated 2 years ago
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆485Oct 14, 2022Updated 3 years ago
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts☆1,378Mar 9, 2026Updated last month
- A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementin…☆534Aug 1, 2022Updated 3 years ago
- 「🚪」Linux Backdoor based on ICMP protocol☆62Dec 7, 2024Updated last year
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆234Oct 18, 2022Updated 3 years ago
- Lifetime AMSI bypass☆673Sep 26, 2023Updated 2 years ago