defaultnamehere / cookie_crimes
Read local Chrome cookies without root or decrypting
☆618Updated 2 years ago
Alternatives and similar repositories for cookie_crimes:
Users that are interested in cookie_crimes are comparing it to the libraries listed below
- GTRS - Google Translator Reverse Shell☆616Updated 3 months ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆592Updated 3 years ago
- Steal Net-NTLM Hash using Bad-PDF☆1,086Updated 4 years ago
- Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)☆497Updated last year
- JShell - Get a JavaScript shell with XSS.☆513Updated 5 years ago
- CATPHISH project - For phishing and corporate espionage. Perfect for RED TEAM.☆607Updated 6 years ago
- Modern tactical exploitation toolkit.☆840Updated 6 months ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆384Updated 6 years ago
- An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector☆985Updated 7 years ago
- IP obfuscator made to make a malicious ip a bit cuter☆542Updated 3 months ago
- Apache Tomcat < 9.0.1 (Beta) / < 8.5.23 / < 8.0.47 / < 7.0.8 - JSP Upload Bypass / Remote Code Execution☆391Updated 7 years ago
- Search for Directory Traversal Vulnerabilities☆422Updated 7 months ago
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆289Updated 5 years ago
- MSDAT: Microsoft SQL Database Attacking Tool☆859Updated last year
- An OSINT tool that discovers sub-domains by searching Certificate Transparency logs☆469Updated 2 years ago
- A tool which creates a spoofed certificate of any online website and signs an Executable for AV Evasion. Works for both Windows and Linux☆1,337Updated 4 years ago
- Internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and us…☆571Updated 7 months ago
- ☆510Updated last year
- Script to steal passwords from ssh.☆478Updated 6 years ago
- A database of common, interesting or useful commands, in one handy referable form☆747Updated last year
- A poorman's proxycannon and botnet, using docker, ovpn files, tor nodes, and dante socks5 proxies☆132Updated last year
- A tool to find and exploit servers vulnerable to Shellshock☆334Updated last year
- DNS covert channel implant for Red Teams.☆733Updated 5 years ago
- This tool can forward TCP traffic over DNS protocol. Non-compile clients + socks5 support.☆404Updated 5 years ago
- HTA encryption tool for RedTeams☆1,376Updated 2 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆758Updated 4 years ago
- A framework for wireless pentesting.☆1,199Updated 4 years ago
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,247Updated 3 years ago
- Pipal, THE password analyser☆636Updated last year
- Nano is a family of PHP web shells which are code golfed for stealth.☆439Updated 4 years ago