greycatsec / cookienapper
Python tool for kidnapping Chrome cookies from a MacOS target
☆22Updated 2 years ago
Alternatives and similar repositories for cookienapper:
Users that are interested in cookienapper are comparing it to the libraries listed below
- Scripts to interact with Microsoft Graph APIs☆34Updated 4 months ago
- ☆24Updated 3 years ago
- ☆36Updated 2 years ago
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Updated 2 years ago
- Aggressor script that gets the latest commands from CobaltStrikes web site and creates an aggressor script based on tool options.☆20Updated 3 years ago
- A Couple of Python Scripts Leveraging MS365's GraphAPI to Send Custom Calendar Events / Emails from Cheap O365 Accounts☆17Updated 10 months ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆28Updated 3 years ago
- WhoAmI by asking the LDAP service on a domain controller.☆61Updated 3 years ago
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆13Updated 5 years ago
- Generate droppers with encrypted payloads automatically.☆53Updated 3 years ago
- Grab unsaved Notepad contents with a Beacon Object File☆10Updated 2 years ago
- Extract registry and NTDS secrets from local or remote disk images☆37Updated 6 months ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆25Updated 2 years ago
- Some of my custom "tools".☆22Updated 3 years ago
- ☆47Updated 2 years ago
- ☆15Updated 2 years ago
- ☆31Updated 4 years ago
- The repository that complements the From zero to hero: creating a reflective loader in C# workshop☆38Updated 3 years ago
- Standalone Cobalt Strike operation logging Aggressor script for Ghostwriter 2.0+☆25Updated 7 months ago
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆33Updated last year
- Windows Persistence Toolkit in C#☆36Updated 2 years ago
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆11Updated 3 years ago
- Example of using Sleep to create better named pipes.☆41Updated last year
- C# project to Reflectively load .Net assemblies in memory☆17Updated 8 months ago
- ☆20Updated last year
- ☆12Updated 2 years ago
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆31Updated 2 years ago
- ☆37Updated 10 months ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago