Tool to transfer credential files from Firefox to your local machine to decrypt offline.
☆22Nov 20, 2021Updated 4 years ago
Alternatives and similar repositories for Firefox-Dumper
Users that are interested in Firefox-Dumper are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- OWASP ZAP add-on to detect reflected parameter vulnerabilities efficiently☆12Feb 19, 2021Updated 5 years ago
- Slides and materials for conference presentations☆11Jun 4, 2023Updated 2 years ago
- Are you forwarding DNS traffic to another server for some reason, but want to make sure only queries for certain names are passed? Say no…☆20Oct 16, 2022Updated 3 years ago
- nmap -> searchploit -> GoBuster/Eyewitness & LDAPsearch & SMBclient & Showmount☆21Apr 26, 2020Updated 5 years ago
- A fast wordlist to nthash converter☆21Nov 22, 2021Updated 4 years ago
- ☆11Jul 3, 2021Updated 4 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Apr 6, 2024Updated last year
- Python3 o365 User Enumeration Tool☆567Jan 28, 2026Updated last month
- ☆15Aug 17, 2023Updated 2 years ago
- demo material for my PowerShell Scripting Secrets presentation☆15Nov 20, 2017Updated 8 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- Using syscall to load shellcode, Evasion techniques☆27Jul 18, 2021Updated 4 years ago
- A compilation of customizations for Debian-based Linux distrubutions (mostly Pop!_OS and Kali Linux) and (finally) a mostly automated scr…☆18Jan 1, 2026Updated 2 months ago
- Shellcode injection using debugging APIs☆19Jan 13, 2014Updated 12 years ago
- This is my path to OSCP☆11Jun 16, 2018Updated 7 years ago
- This repository is for discussion on code for the Automate the Boring Stuff book by Al Stewart.☆10Sep 10, 2018Updated 7 years ago
- Top hashpwn rules☆20Dec 12, 2025Updated 3 months ago
- Scans SMB for Vuln Assessment☆17Mar 4, 2017Updated 9 years ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- Just a quick and dirty tool I created to automate some of my standard recon/enumeration activities when doing CTFs☆13Mar 10, 2021Updated 5 years ago
- A collection of various tools for red-teaming exercises. A mix of C#, Powershell, & Python☆108Jul 26, 2024Updated last year
- Yet Another Fake Honeypot written in Go☆10Dec 8, 2017Updated 8 years ago
- Beacon Object Files used for Cobalt Strike☆19Jul 18, 2023Updated 2 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆41Jan 2, 2018Updated 8 years ago
- Slui File Handler Hijack UAC Bypass Local Privilege Escalation☆94Jun 28, 2025Updated 8 months ago
- ☆11Dec 21, 2016Updated 9 years ago
- ☆53Nov 11, 2021Updated 4 years ago
- ☆16Aug 2, 2025Updated 7 months ago
- Test AMSI Provider implementation in C#☆43Dec 18, 2024Updated last year
- A quick example of the Hells Gate technique in Nim☆93Aug 11, 2021Updated 4 years ago
- Contains my experiments and forays into network automation.☆11Oct 22, 2017Updated 8 years ago
- 7 days of Red Teaming TTPs that your favorite tools may use to acheive a post exploitation goal☆18Apr 17, 2021Updated 4 years ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆257Dec 2, 2021Updated 4 years ago
- ☆100Mar 9, 2021Updated 5 years ago
- CyberSpy is a repository with innate and third party services that can be used for doxing, profiling & identity searching.☆11Jul 8, 2019Updated 6 years ago
- Headers for linking your software with ntdll.dll☆15Nov 4, 2020Updated 5 years ago
- Pure Go lang cryptor and shellcode injector☆20Feb 25, 2021Updated 5 years ago
- ☆12Dec 2, 2021Updated 4 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago