defaultnamehere / cookie_crimesLinks
Read local Chrome cookies without root or decrypting
☆640Updated 2 years ago
Alternatives and similar repositories for cookie_crimes
Users that are interested in cookie_crimes are comparing it to the libraries listed below
Sorting:
- GTRS - Google Translator Reverse Shell☆616Updated 10 months ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆601Updated 4 years ago
- An OSINT tool that discovers sub-domains by searching Certificate Transparency logs☆471Updated 2 years ago
- Modern tactical exploitation toolkit.☆848Updated last year
- Comprehensive Web Based Phishing Suite for Rapid Deployment and Real-Time Alerting!☆376Updated 5 months ago
- This tool can forward TCP traffic over DNS protocol. Non-compile clients + socks5 support.☆412Updated 5 years ago
- A collection of scripts which may come in handy during your freedom fighting activities.☆409Updated 2 years ago
- Steal Net-NTLM Hash using Bad-PDF☆1,118Updated 4 years ago
- A poorman's proxycannon and botnet, using docker, ovpn files, tor nodes, and dante socks5 proxies☆141Updated 2 years ago
- IP obfuscator made to make a malicious ip a bit cuter☆548Updated 9 months ago
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆630Updated 2 years ago
- Turn a normal PDF file into malicious.Use to steal Net-NTLM Hashes from windows machines.☆345Updated 4 years ago
- Bash post exploitation toolkit☆742Updated 2 years ago
- A "malicious" DNS server for executing DNS Rebinding attacks on the fly (public instance running on rebind.network:53)☆654Updated 3 years ago
- Script to steal passwords from ssh.☆483Updated 6 years ago
- Chrome-extension implant that turns victim Chrome browsers into fully-functional HTTP proxies, allowing you to browse sites as your victi…☆1,607Updated 9 months ago
- Detect and decode encoded strings, recursively.☆901Updated 2 years ago
- An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector☆1,004Updated 7 years ago
- ☆521Updated 2 years ago
- Collection of scripts and templates to generate Office documents embedded with the DDE, macro-less command execution technique.☆636Updated 2 years ago
- Windows passwords decryption from dump files☆501Updated 2 years ago
- DNS Rebinding Exploitation Framework☆491Updated 4 years ago
- Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)☆497Updated last year
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆508Updated 3 years ago
- A mostly-serverless distributed hash cracking platform☆812Updated last year
- CATPHISH project - For phishing and corporate espionage. Perfect for RED TEAM.☆615Updated 6 years ago
- raven is a Linkedin information gathering tool that can be used by pentesters to gather information about an organization employees usin…☆791Updated 5 years ago
- A lightweight, portable, and modular tool for Linux enumeration and privilege escalation.☆287Updated 6 months ago
- DNS covert channel implant for Red Teams.☆732Updated 5 years ago
- ☆618Updated 5 years ago