defaultnamehere / cookie_crimesLinks
Read local Chrome cookies without root or decrypting
☆648Updated 2 years ago
Alternatives and similar repositories for cookie_crimes
Users that are interested in cookie_crimes are comparing it to the libraries listed below
Sorting:
- GTRS - Google Translator Reverse Shell☆623Updated last month
- Comprehensive Web Based Phishing Suite for Rapid Deployment and Real-Time Alerting!☆378Updated 8 months ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆604Updated 4 years ago
- Modern tactical exploitation toolkit.☆854Updated last week
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆636Updated 2 years ago
- Steal Net-NTLM Hash using Bad-PDF☆1,131Updated 3 weeks ago
- A guide and tool for cracking ssh known_hosts files with hashcat☆339Updated last year
- Chrome-extension implant that turns victim Chrome browsers into fully-functional HTTP proxies, allowing you to browse sites as your victi…☆1,660Updated last year
- This tool can forward TCP traffic over DNS protocol. Non-compile clients + socks5 support.☆413Updated 5 years ago
- LinkedInt: A LinkedIn scraper for reconnaissance during adversary simulation☆482Updated 2 years ago
- An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector☆1,009Updated 8 years ago
- Turn a normal PDF file into malicious.Use to steal Net-NTLM Hashes from windows machines.☆350Updated 4 years ago
- Embed and hide any file in an HTML file☆492Updated 8 years ago
- ☆521Updated 2 years ago
- Script to steal passwords from ssh.☆484Updated 6 years ago
- IP obfuscator made to make a malicious ip a bit cuter☆546Updated last year
- An OSINT tool that discovers sub-domains by searching Certificate Transparency logs☆478Updated 3 years ago
- ☆619Updated 5 years ago
- This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit c…☆574Updated 5 years ago
- Python script to decrypt saved Chrome usernames and passwords on windows☆287Updated 4 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆948Updated 6 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆505Updated 4 years ago
- Linux privilege escalation exploit via snapd (CVE-2019-7304)☆679Updated 6 years ago
- A "malicious" DNS server for executing DNS Rebinding attacks on the fly (public instance running on rebind.network:53)☆657Updated 3 years ago
- A poorman's proxycannon and botnet, using docker, ovpn files, tor nodes, and dante socks5 proxies☆142Updated 2 years ago
- Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)☆496Updated last year
- raven is a Linkedin information gathering tool that can be used by pentesters to gather information about an organization employees usin…☆790Updated 5 years ago
- Detect and decode encoded strings, recursively.☆907Updated 2 months ago
- Stealing CSRF tokens with CSS injection (without iFrames)☆323Updated 7 years ago
- Tricks for penetration testing☆579Updated 4 years ago