Get chrome passwords from chrome database in powershell
☆33Apr 5, 2019Updated 6 years ago
Alternatives and similar repositories for Get-ChromePasswords
Users that are interested in Get-ChromePasswords are comparing it to the libraries listed below
Sorting:
- everything that does not fit elsewhere☆12Dec 27, 2017Updated 8 years ago
- 超精简的POC扫描框架☆10Aug 5, 2019Updated 6 years ago
- POC for CVE-2019-14339 Canon PRINT 2.5.5☆14Sep 15, 2019Updated 6 years ago
- CVE-2020-1337 a bypass of (PrintDemon) CVE-2020-1048’s patch☆14Aug 11, 2020Updated 5 years ago
- ☆17Aug 3, 2021Updated 4 years ago
- Bluecoat proxies URL filtering bypass PoC☆14May 19, 2015Updated 10 years ago
- AgentTesla botnet C&C RCE exploit.☆16Aug 13, 2019Updated 6 years ago
- Working exploit code for CVE-2019-17625☆19Mar 12, 2020Updated 5 years ago
- A Go application that feeds of data from Apache Kafka to send alerts via SMS,EMAIL or WebHook delivery channels.☆19Sep 11, 2018Updated 7 years ago
- A very quickly script for rubber ducky which exploits the gatherNetworkInfo.vbs file in the C: \ Windows \ System32 folder to steal…☆26Feb 9, 2022Updated 4 years ago
- Abusing SketchUp to make persistence on Windows☆21Mar 26, 2019Updated 6 years ago
- Is command prompt blocked on your school/work computers? Here is an easy fix!☆21Sep 19, 2019Updated 6 years ago
- Organizational Material☆10Aug 18, 2020Updated 5 years ago
- ☆21Oct 22, 2019Updated 6 years ago
- A pattern for client/server communication via Named Pipes via C#☆97Aug 8, 2018Updated 7 years ago
- Eternalblue-Doublepulsar without Metasploit or python☆53May 30, 2019Updated 6 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25May 3, 2018Updated 7 years ago
- Zimbra RCE PoC - CVE-2019-9670 XXE/SSRF☆27Aug 16, 2019Updated 6 years ago
- Port of eternal blue exploits to powershell☆151Jun 3, 2017Updated 8 years ago
- Metasploit Framework☆25Jan 12, 2020Updated 6 years ago
- A dumb script for finding dumb coding errors in WordPress plugins☆53Jun 15, 2022Updated 3 years ago
- DrMITM is a program designed to globally log all traffic of a website.☆28Feb 10, 2019Updated 7 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆36Dec 9, 2019Updated 6 years ago
- Tool designed to study the answers of your DNS resolver and make easier the identification of techniques such as DNS Hijacking/Poisoning☆27Jan 6, 2019Updated 7 years ago
- ☆39Oct 8, 2019Updated 6 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Mar 6, 2021Updated 5 years ago
- Raw syscall implementations with Powershell☆30Sep 19, 2019Updated 6 years ago
- with metasploit☆63Apr 19, 2020Updated 5 years ago
- Playing around with token manipulation in C#.☆29Nov 6, 2019Updated 6 years ago
- Simple Windows Event Log Forwarder (SWELF). Its easy to use/simply works Log Forwarder and EVTX Parser. Almost in full release here at ht…☆24Jun 20, 2023Updated 2 years ago
- ☆28Dec 28, 2017Updated 8 years ago
- This repo contains Powershell scripts used for general hackery.☆582Dec 4, 2024Updated last year
- Powershell function to pull the local admin passwords from LDAP, stored there by LAPS.☆122Dec 11, 2019Updated 6 years ago
- Webmin Remote Code Execution (authenticated)☆33Sep 1, 2019Updated 6 years ago
- GO sandbox to run untrusted code☆42Jan 17, 2020Updated 6 years ago
- The goal is to provide an easy to use API to escalate privileges on Linux, Windows and Mac OS☆37Feb 25, 2023Updated 3 years ago
- Post Exploitation Linux Toolkit☆33Oct 19, 2016Updated 9 years ago
- Vulnerability Reports by Aleph Research☆36Mar 10, 2024Updated last year
- A small two-file JSON serializer in C# that works on MonoDroid/MonoTouch☆11Jun 25, 2019Updated 6 years ago