henryreed / chrome_enumLinks
Decrypts and dumps Chrome-based browser cookies and passwords in Microsoft Windows.
☆20Updated last year
Alternatives and similar repositories for chrome_enum
Users that are interested in chrome_enum are comparing it to the libraries listed below
Sorting:
- [Discontinued] Transform your payload into fake powerpoint (.ppt)☆41Updated 4 years ago
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one to…☆60Updated 4 years ago
- MSFVenom Powershell Stager Encoder & Generator☆16Updated 4 years ago
- AV-evading Pythonic Reverse Shell with Dynamic Adaption Capabilities☆74Updated 3 years ago
- Transform your batch (bat) script into one binary.exe☆52Updated last year
- cross-platform C2 framework in python 2☆41Updated 3 years ago
- A Remote Access Tool using Google Apps Script as the proxy for command and control.☆114Updated 4 years ago
- extensible exploitation framework shipped on a modular multi-tasking architecture☆77Updated 2 years ago
- Python Script to Crack Zip Password with Dictionary attack and also use Crunch as Pipeline☆39Updated 7 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆98Updated 4 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- A *nix Enumerator & Auto Privilege Escalation tool.☆152Updated 3 years ago
- PowerShell payload generator☆117Updated 3 years ago
- A simple Python script that reads a text file with lots of e-mails and passwords, and tries to check if those credentials are valid by tr…☆72Updated last year
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆122Updated 5 years ago
- Bare Bones Banking malware coded for research & educational purposes☆88Updated 5 years ago
- Reverse shell using Windows Registry files (.reg)☆17Updated 5 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆19Updated 5 years ago
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. It allows one to …☆110Updated 5 years ago
- An AV exclusion enumeration tool written in Python.☆59Updated 3 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆31Updated 4 years ago
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing stand…☆90Updated last year
- Using bitsadmin to download our malware and to bypass defender☆27Updated 4 years ago
- Windows Keylogger in C++☆19Updated 2 years ago
- ☆53Updated 4 years ago
- This Buffer Overflow Toolkit works through FTP, SMTP, POP, HTTP protocols as well file outputs for playlists exploiting customized variab…☆17Updated 3 years ago
- Wi-Fi Exploit Tool☆53Updated 5 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated last year
- ☆17Updated 5 years ago
- Assist reverse tcp shells in post-exploration tasks☆223Updated 3 months ago