g33kyrash / cookie_stealer
steal cookies from firefox cookies database(cookies.sqlite)
☆55Updated 9 years ago
Alternatives and similar repositories for cookie_stealer:
Users that are interested in cookie_stealer are comparing it to the libraries listed below
- some python3 functions to add spreading features to any python backdoor☆51Updated 8 years ago
- Basic python script for detect airdroid users in lan☆48Updated 4 years ago
- Search for leaked creadentials on pwndb using the command line and tor.☆23Updated 6 years ago
- Red Login: SSH Brute-force Tools☆102Updated 6 years ago
- Kill Any Antivirus Using Python For Windows Users .☆45Updated 8 years ago
- QRLJacking or Quick Response Code Login Jacking is a simple-but-nasty attack vector affecting all the applications that relays on “Login…☆13Updated 8 years ago
- Multiplatform payload dropper☆260Updated 3 years ago
- A ctypes powered python keylogger.☆104Updated 5 years ago
- Social Engineering Tool Oriented to facebook☆56Updated 7 years ago
- Python backdoor that uses http post/get requests to communicate☆40Updated 8 years ago
- Phishing webapp generator☆41Updated 6 years ago
- USB-Rubber-Ducky Payload - Mimikatz in Memory w UAC Bypass☆35Updated 9 years ago
- A remote msfconsole written in Python 2.7 to connect to the msfrcpd server of metasploit. This tool gives you the ability to load modules…☆56Updated 6 years ago
- A remote keylogger with some cool features☆44Updated 6 months ago
- trolo - an easy to use script for generating Payloads that bypasses antivirus☆49Updated 7 years ago
- A simple phishing tool that can phish almost any website☆75Updated 6 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆225Updated 3 years ago
- PoC Android smart phone botnet☆77Updated 12 years ago
- This tool creates almost undetectabe trojan virus to exploit windows machine.☆134Updated 7 years ago
- Python code to extract chrome cookie, history and login data files☆58Updated 7 years ago
- Forced Man-In-The-Middle HTTPs-Avoiding Reverse Proxy☆62Updated 5 years ago
- A tool to mass scan SQL Injection Vulnerable websites from a file.☆70Updated 7 years ago
- Post-Exploitation Framework☆75Updated 7 years ago
- Capstone: Keylogger Trojan☆35Updated 6 years ago
- Gathering Email Information Tool☆35Updated 7 years ago
- Help a buddy prank his colleagues! Show your mettle with spoofing emails, malicious attachments, spoofing sms, and spoofing phone calls t…☆97Updated 8 years ago
- ssh management tool to provides commandline access to a remote system running SSH server☆76Updated 6 years ago
- A script written lazily for generating cross-platform backdoors on the go :)☆184Updated 6 years ago
- SMS Phishing Tools☆77Updated 7 years ago
- Terminator metasploit payload generator☆177Updated 6 years ago