henryreed / chrome_enumLinks
Decrypts and dumps Chrome-based browser cookies and passwords in Microsoft Windows.
☆20Updated last year
Alternatives and similar repositories for chrome_enum
Users that are interested in chrome_enum are comparing it to the libraries listed below
Sorting:
- [Discontinued] Transform your payload into fake powerpoint (.ppt)☆40Updated 4 years ago
- ☆52Updated 4 years ago
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one to…☆60Updated 4 years ago
- Transform your batch (bat) script into one binary.exe☆50Updated last year
- ViperVenom is an open-source cyber offensive tool developed by Itay Funes for pentesters. ViperVenom is a great tool when it comes to pen…☆14Updated 3 years ago
- MSFVenom Powershell Stager Encoder & Generator☆16Updated 4 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Updated 5 years ago
- Reverse shell using Windows Registry files (.reg)☆17Updated 5 years ago
- cross-platform C2 framework in python 2☆41Updated 3 years ago
- Custom pentesting tools☆25Updated 4 years ago
- Disable Windows Defender All Version☆31Updated 4 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆43Updated 3 years ago
- ☆17Updated 5 years ago
- PowerShell payload generator☆117Updated 3 years ago
- Windows Keylogger in C++☆19Updated 2 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- Some random tools I use for penetration testing☆90Updated 2 months ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 3 years ago
- Malicious DLL (Reverse Shell) generator for DLL Hijacking☆41Updated 5 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆18Updated 4 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆25Updated 4 years ago
- Bypass Windows Defender with py2exe from memory.☆36Updated 3 years ago
- Modern Javascript keylogger with web panel☆22Updated 5 years ago
- Bare Bones Banking malware coded for research & educational purposes☆89Updated 4 years ago
- A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a dec…☆32Updated 6 years ago
- An AV exclusion enumeration tool written in Python.☆59Updated 3 years ago
- Koadic C3 COM Command & Control - JScript RAT☆45Updated 7 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 3 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- ☆24Updated 5 years ago