Python tool for kidnapping Chrome cookies from a MacOS target
☆22Oct 5, 2022Updated 3 years ago
Alternatives and similar repositories for cookienapper
Users that are interested in cookienapper are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- C# version of NTLMRawUnHide☆72Oct 8, 2022Updated 3 years ago
- PoC script to demonstrate collection of SCCM attack paths that can be viewed in BH with OpenGraph☆24Aug 2, 2025Updated 8 months ago
- ☆18Jun 10, 2025Updated 10 months ago
- A dotnet executable to get an Entra token in an authenticated runtime☆17Oct 30, 2024Updated last year
- ☆38Jan 7, 2025Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 5 months ago
- CNA that interacts with a JAR file to dynamically rename GUI tabs within Cobalt Strike from a JSON file.☆25May 23, 2022Updated 3 years ago
- .NET port of Leron Gray's azbelt tool.☆26Sep 21, 2023Updated 2 years ago
- ☆53Nov 11, 2021Updated 4 years ago
- ☆14Sep 26, 2023Updated 2 years ago
- Windows Persistence Toolkit in C#☆36Sep 23, 2022Updated 3 years ago
- A *very* imperfect attempt to correlate Kernel32 function calls to native API (Nt/Zw) counterparts/execution flow.☆28Dec 16, 2021Updated 4 years ago
- WhoAmI by asking the LDAP service on a domain controller.☆65Feb 8, 2022Updated 4 years ago
- Threadless Injection Payload Toolkit☆12Oct 12, 2023Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Apply a filter to the events being reported by windows event logging☆15Sep 10, 2020Updated 5 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆34Aug 16, 2023Updated 2 years ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- C# alternative to the linux "cat" command... Prints file contents to console. For use with Cobalt Strike's Execute-Assembly☆15Jul 15, 2021Updated 4 years ago
- Encode binary as English text over HTTP(s)☆30Aug 25, 2023Updated 2 years ago
- ☆53Jun 28, 2025Updated 9 months ago
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆33May 3, 2024Updated last year
- ☆39Jul 29, 2021Updated 4 years ago
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆180Feb 14, 2023Updated 3 years ago
- AAD related enumeration in Nim☆131Sep 7, 2023Updated 2 years ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆97Apr 13, 2023Updated 2 years ago
- Backdoored Electron app.asar☆17Jun 11, 2021Updated 4 years ago
- Convert an LDIF file to JSON files ingestible by BloodHound☆45Feb 9, 2026Updated 2 months ago
- Beacon Object File & C# project to check LDAP signing☆200Aug 7, 2024Updated last year
- An aggressor script for Cobalt Strike to query Windows' GetLastError messages☆18Sep 25, 2022Updated 3 years ago
- A BOF to interact with COM objects associated with the Windows software firewall.☆113Oct 10, 2021Updated 4 years ago
- Vectored Exception Handling Squared☆31Dec 27, 2025Updated 3 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Use to copy a file from an NTFS partitioned volume by reading the raw volume and parsing the NTFS structures.☆119Apr 22, 2021Updated 4 years ago
- A BOF to automate common persistence tasks for red teamers☆296Mar 7, 2023Updated 3 years ago
- asynchronous SSH client in Python☆11Oct 29, 2025Updated 5 months ago
- A small go tool to upload JSON files to the BloodHound community edition API☆32May 29, 2024Updated last year
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- Proof of concept Beacon Object File (BOF) that attempts to detect userland hooks in place by AV/EDR☆102Jul 22, 2021Updated 4 years ago
- Grab unsaved Notepad contents with a Beacon Object File☆55Jun 19, 2022Updated 3 years ago