Python tool for kidnapping Chrome cookies from a MacOS target
☆22Oct 5, 2022Updated 3 years ago
Alternatives and similar repositories for cookienapper
Users that are interested in cookienapper are comparing it to the libraries listed below
Sorting:
- C# version of NTLMRawUnHide☆72Oct 8, 2022Updated 3 years ago
- PoC script to demonstrate collection of SCCM attack paths that can be viewed in BH with OpenGraph☆24Aug 2, 2025Updated 7 months ago
- ☆18Jun 10, 2025Updated 9 months ago
- A dotnet executable to get an Entra token in an authenticated runtime☆17Oct 30, 2024Updated last year
- ☆38Jan 7, 2025Updated last year
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 4 months ago
- CNA that interacts with a JAR file to dynamically rename GUI tabs within Cobalt Strike from a JSON file.☆25May 23, 2022Updated 3 years ago
- .NET port of Leron Gray's azbelt tool.☆26Sep 21, 2023Updated 2 years ago
- ☆53Nov 11, 2021Updated 4 years ago
- ☆14Sep 26, 2023Updated 2 years ago
- Windows Persistence Toolkit in C#☆36Sep 23, 2022Updated 3 years ago
- A *very* imperfect attempt to correlate Kernel32 function calls to native API (Nt/Zw) counterparts/execution flow.☆28Dec 16, 2021Updated 4 years ago
- WhoAmI by asking the LDAP service on a domain controller.☆65Feb 8, 2022Updated 4 years ago
- Threadless Injection Payload Toolkit☆12Oct 12, 2023Updated 2 years ago
- Apply a filter to the events being reported by windows event logging☆15Sep 10, 2020Updated 5 years ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆34Aug 16, 2023Updated 2 years ago
- Tomcat backdoor based on CS blog☆29Jun 30, 2023Updated 2 years ago
- Encode binary as English text over HTTP(s)☆30Aug 25, 2023Updated 2 years ago
- ☆53Jun 28, 2025Updated 8 months ago
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆33May 3, 2024Updated last year
- ☆39Jul 29, 2021Updated 4 years ago
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated last year
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆180Feb 14, 2023Updated 3 years ago
- A BOF to interact with COM objects associated with the Windows software firewall.☆109Oct 10, 2021Updated 4 years ago
- AAD related enumeration in Nim☆131Sep 7, 2023Updated 2 years ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆97Apr 13, 2023Updated 2 years ago
- Backdoored Electron app.asar☆17Jun 11, 2021Updated 4 years ago
- Convert an LDIF file to JSON files ingestible by BloodHound☆45Feb 9, 2026Updated last month
- Beacon Object File & C# project to check LDAP signing☆199Aug 7, 2024Updated last year
- An aggressor script for Cobalt Strike to query Windows' GetLastError messages☆18Sep 25, 2022Updated 3 years ago
- Vectored Exception Handling Squared☆31Dec 27, 2025Updated 2 months ago
- Use to copy a file from an NTFS partitioned volume by reading the raw volume and parsing the NTFS structures.☆119Apr 22, 2021Updated 4 years ago
- A BOF to automate common persistence tasks for red teamers☆297Mar 7, 2023Updated 3 years ago
- asynchronous SSH client in Python☆11Oct 29, 2025Updated 4 months ago
- A small go tool to upload JSON files to the BloodHound community edition API☆31May 29, 2024Updated last year
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- ☆19Nov 28, 2024Updated last year
- Grab unsaved Notepad contents with a Beacon Object File☆55Jun 19, 2022Updated 3 years ago