henryreed / chrome_enumLinks
Decrypts and dumps Chrome-based browser cookies and passwords in Microsoft Windows.
☆19Updated last year
Alternatives and similar repositories for chrome_enum
Users that are interested in chrome_enum are comparing it to the libraries listed below
Sorting:
- [Discontinued] Transform your payload into fake powerpoint (.ppt)☆42Updated 5 years ago
- A Remote Access Tool using Google Apps Script as the proxy for command and control.☆113Updated 4 years ago
- AV-evading Pythonic Reverse Shell with Dynamic Adaption Capabilities☆72Updated 4 years ago
- cross-platform C2 framework in python 2☆38Updated 3 years ago
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one to…☆59Updated 4 years ago
- MSFVenom Powershell Stager Encoder & Generator☆16Updated 4 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆92Updated 4 years ago
- ☆53Updated 4 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆120Updated 5 years ago
- Bare Bones Banking malware coded for research & educational purposes☆87Updated 5 years ago
- PowerShell payload generator☆117Updated 4 years ago
- Transform your batch (bat) script into one binary.exe☆51Updated last year
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated 2 years ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆150Updated 4 years ago
- extensible exploitation framework shipped on a modular multi-tasking architecture☆76Updated 3 years ago
- CLI Frontend for PowerShell Empire.☆49Updated 4 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆31Updated 4 years ago
- This Buffer Overflow Toolkit works through FTP, SMTP, POP, HTTP protocols as well file outputs for playlists exploiting customized variab…☆18Updated 4 years ago
- ☆25Updated 5 years ago
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. It allows one to …☆109Updated 5 years ago
- Functions that can be used to gain Reverse Shells with PowerShell☆83Updated 3 years ago
- A multi threaded Python script designed to brute force directories and files names on webservers.☆79Updated 3 years ago
- ☆36Updated 4 years ago
- Reverse shell using Windows Registry files (.reg)☆17Updated 5 years ago
- Windows privilege escalation with cmd☆90Updated 4 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆58Updated 4 years ago
- EXXX EVASION | Metasploit Antivirus Evasion | Fully Undetectable Payloads☆29Updated 5 years ago
- A simple Python script that reads a text file with lots of e-mails and passwords, and tries to check if those credentials are valid by tr…☆72Updated 2 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆114Updated 3 years ago
- Kraker is a distributed password brute-force system that focused on easy use.☆83Updated 6 months ago