henryreed / chrome_enumLinks
Decrypts and dumps Chrome-based browser cookies and passwords in Microsoft Windows.
☆20Updated last year
Alternatives and similar repositories for chrome_enum
Users that are interested in chrome_enum are comparing it to the libraries listed below
Sorting:
- [Discontinued] Transform your payload into fake powerpoint (.ppt)☆41Updated 4 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Updated 5 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆98Updated 4 years ago
- AV-evading Pythonic Reverse Shell with Dynamic Adaption Capabilities☆74Updated 3 years ago
- A Remote Access Tool using Google Apps Script as the proxy for command and control.☆114Updated 3 years ago
- ☆53Updated 4 years ago
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one to…☆60Updated 4 years ago
- MSFVenom Powershell Stager Encoder & Generator☆16Updated 4 years ago
- cross-platform C2 framework in python 2☆41Updated 3 years ago
- Reverse shell using Windows Registry files (.reg)☆17Updated 5 years ago
- Transform your batch (bat) script into one binary.exe☆52Updated last year
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆30Updated 4 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆122Updated 5 years ago
- Functions that can be used to gain Reverse Shells with PowerShell☆83Updated 2 years ago
- PowerShell payload generator☆117Updated 3 years ago
- Bypass Windows Defender with py2exe from memory.☆36Updated 3 years ago
- extensible exploitation framework shipped on a modular multi-tasking architecture☆76Updated 2 years ago
- Bare Bones Banking malware coded for research & educational purposes☆88Updated 4 years ago
- Disable Windows Defender All Version☆32Updated 4 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆12Updated 3 years ago
- FUD metasploit Persistence RAT☆4Updated 2 years ago
- Koadic C3 COM Command & Control - JScript RAT☆45Updated 8 years ago
- ☆36Updated 3 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- An AV exclusion enumeration tool written in Python.☆59Updated 3 years ago
- Python Script to Crack Zip Password with Dictionary attack and also use Crunch as Pipeline☆38Updated 7 years ago
- Windows Keylogger in C++☆19Updated 2 years ago
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. It allows one to …☆110Updated 5 years ago
- ☆17Updated 5 years ago
- Using bitsadmin to download our malware and to bypass defender☆27Updated 4 years ago