Tool to transfer credential files from Firefox to your local machine to decrypt offline.
☆22Nov 20, 2021Updated 4 years ago
Alternatives and similar repositories for Firefox-Dumper
Users that are interested in Firefox-Dumper are comparing it to the libraries listed below
Sorting:
- ☆15Aug 17, 2023Updated 2 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- OWASP ZAP add-on to detect reflected parameter vulnerabilities efficiently☆12Feb 19, 2021Updated 5 years ago
- Using syscall to load shellcode, Evasion techniques☆27Jul 18, 2021Updated 4 years ago
- Shellcode injection using debugging APIs☆19Jan 13, 2014Updated 12 years ago
- ☆12Dec 2, 2021Updated 4 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Apr 6, 2024Updated last year
- Beacon Object Files used for Cobalt Strike☆19Jul 18, 2023Updated 2 years ago
- Offensive V Programming☆18Nov 3, 2021Updated 4 years ago
- Headers for linking your software with ntdll.dll☆15Nov 4, 2020Updated 5 years ago
- Visual Studio (C++) Solution Template for Payloads☆18Oct 30, 2019Updated 6 years ago
- Python3 o365 User Enumeration Tool☆567Jan 28, 2026Updated last month
- Are you forwarding DNS traffic to another server for some reason, but want to make sure only queries for certain names are passed? Say no…☆20Oct 16, 2022Updated 3 years ago
- Pure Go lang cryptor and shellcode injector☆20Feb 25, 2021Updated 5 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- nmap -> searchploit -> GoBuster/Eyewitness & LDAPsearch & SMBclient & Showmount☆21Apr 26, 2020Updated 5 years ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- Top hashpwn rules☆20Dec 12, 2025Updated 2 months ago
- LSASS enumeration like pypykatz written in C-Lang☆20Dec 1, 2021Updated 4 years ago
- Dynamic COFF object loader☆23Jun 29, 2018Updated 7 years ago
- ☆21Jan 28, 2020Updated 6 years ago
- A fast wordlist to nthash converter☆21Nov 22, 2021Updated 4 years ago
- A quick example of the Hells Gate technique in Nim☆94Aug 11, 2021Updated 4 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Mar 9, 2021Updated 4 years ago
- A compilation of customizations for Debian-based Linux distrubutions (mostly Pop!_OS and Kali Linux) and (finally) a mostly automated scr…☆18Jan 1, 2026Updated 2 months ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆24Sep 19, 2022Updated 3 years ago
- MiniDumpWriteDump behavior modification hook☆50Feb 15, 2021Updated 5 years ago
- Several self-defense shellcodes☆23Jul 16, 2019Updated 6 years ago
- A .NET tool that uses AppDomain's to enable dynamic execution and escape detection.☆29Nov 25, 2019Updated 6 years ago
- Azure AD Incident Response☆27Oct 8, 2021Updated 4 years ago
- Active Directory Generator files for Movement, Pivoting, and Persistence for Pentesters and Ethical Hackers.☆218Dec 28, 2022Updated 3 years ago
- A rust based DLL injection project☆31Sep 18, 2022Updated 3 years ago
- ☆19Jul 23, 2021Updated 4 years ago
- Protected Process (Light) Dump: Uses Zemana AntiMalware Engine To Open a Privileged Handle to a PP/PPL Process And Inject MiniDumpWriteDu…☆25Mar 26, 2020Updated 5 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Aug 29, 2021Updated 4 years ago
- Quick and dirty PoSH code to read teams messages☆23Feb 5, 2025Updated last year
- ☆53Nov 11, 2021Updated 4 years ago
- POC code to crash Windows Event Logger Service☆27Oct 16, 2020Updated 5 years ago
- A list of windows potatoes!☆26Mar 6, 2022Updated 3 years ago