hassaanaliw / chromepass
Get all passwords stored by Chrome on WINDOWS.
β173Updated 5 years ago
Alternatives and similar repositories for chromepass:
Users that are interested in chromepass are comparing it to the libraries listed below
- Python script to decrypt saved Chrome usernames and passwords on windowsβ284Updated 3 years ago
- A fully featured Windows backdoor that uses Gmail as a C&C serverβ497Updated 5 years ago
- π A dynamic dictionary merger for successful dictionary based attacks.β224Updated 3 years ago
- Chromebackdoor is a PoC of pentest tool, this tool use a MITB technique for generate a windows executable ".exe" after launch run a malicβ¦β507Updated 8 years ago
- Pythonic ransomware proof of concept.β216Updated 4 years ago
- Collection of scripts to aid in delivering payloads via Office Macros. Most are python. See http://khr0x40sh.wordpress.com for details.β406Updated 8 years ago
- Python 2.7 is obsolete, please use https://github.com/xp4xbox/Python-Keyloggerβ50Updated 4 years ago
- A ctypes powered python keylogger.β105Updated 5 years ago
- EternalRocks wormβ453Updated 7 years ago
- Python logger with multiple features.β526Updated 3 years ago
- Xenotix Python Keylogger for Windows.β456Updated 6 years ago
- Chrome Keylogger Extensionβ165Updated 9 years ago
- Keylogger for Windows.β214Updated 4 years ago
- The Hacker's ToolBoxβ186Updated 7 years ago
- Script to generate malicious debian packages (debain trojans).β118Updated 5 years ago
- PwnSTAR (Pwn SofT-Ap scRipt) - for all your fake-AP needs!β254Updated 7 years ago
- A proof of concept injectable C++ dll, that uses naked inline hooking and direct memory modification to change your TeamViewer permissioβ¦β309Updated 7 years ago
- NXcrypt - 'python backdoor' frameworkβ364Updated 7 years ago
- Create fake AP in Kali with 1 commandβ268Updated 9 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]β223Updated 3 years ago
- DNS spoofer. Drops DNS responses from the router and replaces it with the spoofed DNS responseβ281Updated 7 years ago
- β425Updated 7 years ago
- Guides, Tools, Tips and such for working with the Shadow Brokers dumpsβ224Updated 6 years ago
- Remote administration service which uses twitter as a command and control serverβ711Updated 4 years ago
- Blaze Telegram Backdoor Toolkit is a post-exploitation tool that leverages the infrastructure of Telegram as a C&Cβ199Updated 6 years ago
- A simple, fully python ransomware PoCβ372Updated 4 years ago
- Password lists for use in penetration testing situations, broken up by TLD.β320Updated 9 years ago
- Trojanize your payload - WinRAR (SFX) automatization - under Linux distrosβ288Updated 7 years ago
- A Simple Multi-Threaded SSH Brute Forcerβ269Updated 4 years ago
- HERCULES is a special payload generator that can bypass antivirus softwares.β600Updated 3 years ago