Python tool for kidnapping Chrome cookies from a MacOS target
☆22Oct 5, 2022Updated 3 years ago
Alternatives and similar repositories for cookienapper
Users that are interested in cookienapper are comparing it to the libraries listed below
Sorting:
- C# version of NTLMRawUnHide☆72Oct 8, 2022Updated 3 years ago
- ☆38Jan 7, 2025Updated last year
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- .NET port of Leron Gray's azbelt tool.☆26Sep 21, 2023Updated 2 years ago
- CNA that interacts with a JAR file to dynamically rename GUI tabs within Cobalt Strike from a JSON file.☆25May 23, 2022Updated 3 years ago
- Tomcat backdoor based on CS blog☆29Jun 30, 2023Updated 2 years ago
- Threadless Injection Payload Toolkit☆12Oct 12, 2023Updated 2 years ago
- ☆14Sep 26, 2023Updated 2 years ago
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 4 months ago
- A dotnet executable to get an Entra token in an authenticated runtime☆16Oct 30, 2024Updated last year
- A *very* imperfect attempt to correlate Kernel32 function calls to native API (Nt/Zw) counterparts/execution flow.☆28Dec 16, 2021Updated 4 years ago
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆33May 3, 2024Updated last year
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- asynchronous SSH client in Python☆11Oct 29, 2025Updated 4 months ago
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated 11 months ago
- ☆17Jun 10, 2025Updated 8 months ago
- WhoAmI by asking the LDAP service on a domain controller.☆64Feb 8, 2022Updated 4 years ago
- ☆53Nov 11, 2021Updated 4 years ago
- Azure AD Identity Protection Cookie Spoofing☆35Sep 2, 2023Updated 2 years ago
- ☆18Sep 14, 2023Updated 2 years ago
- Apply a filter to the events being reported by windows event logging☆15Sep 10, 2020Updated 5 years ago
- Encode binary as English text over HTTP(s)☆30Aug 25, 2023Updated 2 years ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆97Apr 13, 2023Updated 2 years ago
- Backdoored Electron app.asar☆17Jun 11, 2021Updated 4 years ago
- PoC script to demonstrate collection of SCCM attack paths that can be viewed in BH with OpenGraph☆24Aug 2, 2025Updated 6 months ago
- Windows Persistence Toolkit in C#☆36Sep 23, 2022Updated 3 years ago
- Talk slides and material☆37Mar 24, 2024Updated last year
- Bash and ZSH integration for Impacket☆73Nov 6, 2025Updated 3 months ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆34Aug 16, 2023Updated 2 years ago
- CVE-2013-4786 Go exploitation tool☆40Nov 18, 2025Updated 3 months ago
- C# alternative to the linux "cat" command... Prints file contents to console. For use with Cobalt Strike's Execute-Assembly☆15Jul 15, 2021Updated 4 years ago
- ☆19Nov 28, 2024Updated last year
- ☆16Jul 5, 2017Updated 8 years ago
- Extract registry and NTDS secrets from local or remote disk images☆45Mar 15, 2025Updated 11 months ago
- A pattern for a self-installing Windows service in C# with the unstoppable attributes in C#.☆67Jan 19, 2019Updated 7 years ago
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Aug 5, 2022Updated 3 years ago
- ☆37May 8, 2022Updated 3 years ago
- ☆19Aug 26, 2020Updated 5 years ago
- A Windows 10 login phishing page for your red team exercises☆15Apr 25, 2021Updated 4 years ago