g33kyrash / cookie_stealer
steal cookies from firefox cookies database(cookies.sqlite)
☆56Updated 9 years ago
Alternatives and similar repositories for cookie_stealer:
Users that are interested in cookie_stealer are comparing it to the libraries listed below
- some python3 functions to add spreading features to any python backdoor☆53Updated 8 years ago
- Kill Any Antivirus Using Python For Windows Users .☆44Updated 8 years ago
- QRLJacking or Quick Response Code Login Jacking is a simple-but-nasty attack vector affecting all the applications that relays on “Login…☆13Updated 8 years ago
- Create a worm that bruteforces SSH and "infect" the system.☆26Updated 8 years ago
- trolo - an easy to use script for generating Payloads that bypasses antivirus☆50Updated 8 years ago
- A simple phishing tool that can phish almost any website☆76Updated 6 years ago
- Basic python script for detect airdroid users in lan☆49Updated 4 years ago
- A Python program that scans RAM.☆39Updated 10 years ago
- PoC Android smart phone botnet☆78Updated 12 years ago
- SMS Phishing Tools☆78Updated 7 years ago
- Help a buddy prank his colleagues! Show your mettle with spoofing emails, malicious attachments, spoofing sms, and spoofing phone calls t…☆96Updated 8 years ago
- Loki.Rat is a fork of the Ares RAT, it integrates new modules, like recording , lockscreen , and locate options. Loki.Rat is a Python Rem…☆74Updated 2 years ago
- ☆12Updated 11 years ago
- Phishing webapp generator☆41Updated 6 years ago
- Search for leaked creadentials on pwndb using the command line and tor.☆24Updated 6 years ago
- Advanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idk☆53Updated 3 years ago
- A URL shortener☆18Updated 6 years ago
- A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines☆29Updated 9 years ago
- Python based Remote Administration Tool(RAT)☆92Updated 4 years ago
- Bind 2 exe's and have them run at the same time.☆46Updated 10 years ago
- Red Login: SSH Brute-force Tools☆103Updated 6 years ago
- ssh management tool to provides commandline access to a remote system running SSH server☆75Updated 6 years ago
- Automatic Ducky Payload Generator☆16Updated 2 years ago
- A ctypes powered python keylogger.☆105Updated 5 years ago
- Python backdoor that uses http post/get requests to communicate☆40Updated 8 years ago
- A tool to mass scan SQL Injection Vulnerable websites from a file.☆70Updated 8 years ago
- website admin panel finder☆36Updated 4 years ago
- Python code to extract chrome cookie, history and login data files☆59Updated 7 years ago
- Capstone: Keylogger Trojan☆35Updated 6 years ago
- Post-Exploitation Framework☆76Updated 8 years ago