Decrypts and dumps Chrome-based browser cookies and passwords in Microsoft Windows.
☆19Feb 11, 2026Updated 2 months ago
Alternatives and similar repositories for chrome_enum
Users that are interested in chrome_enum are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find them☆17Feb 1, 2021Updated 5 years ago
- CTF problems I have created.☆14Mar 5, 2023Updated 3 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆28Dec 29, 2021Updated 4 years ago
- My CTF Challenges. No one plays.☆13Dec 4, 2022Updated 3 years ago
- A collection of tools for managing and automating vulnerability management.☆13Mar 24, 2022Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- BAT is a tool to help everyone to securing their web-servers.☆10Mar 29, 2021Updated 5 years ago
- Burp Suite extension for extracting metadata from files☆20Dec 29, 2020Updated 5 years ago
- A simple tool to check subdomains for clickjacking attack.☆12Mar 30, 2021Updated 5 years ago
- The challenges for HKCERT CTF 2020☆13Nov 16, 2020Updated 5 years ago
- OC Admin (Formerly EZ-Cloud) - the Open Collector Admin and On-Boarder for Core SIEM☆12Jan 13, 2026Updated 3 months ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Dec 6, 2020Updated 5 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆13May 10, 2020Updated 5 years ago
- mesh-kridik is an open-source security checker that performs various security checks on a Kubernetes cluster with istio service mesh and …☆27Dec 9, 2024Updated last year
- The project aims at building a Scan-Time Crypter that can assist a malware in bypassing antivirus software. The Crypter will open the mal…☆17Feb 23, 2021Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- MalwareAnalysis☆12Dec 19, 2020Updated 5 years ago
- psgen is a powershell payload generator tool for hacking. It can be used to generate, minify, and encode the powershell payload (e.g., re…☆18Jun 30, 2020Updated 5 years ago
- A proof-of-concept Node.js ransomware☆20Mar 27, 2022Updated 4 years ago
- 🐊 A small Password Attack☆15Apr 1, 2024Updated 2 years ago
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆22Apr 19, 2022Updated 4 years ago
- FCracker is a command line tool designed to brute force encrypted files like zip, 7z, rar, pdf etc.☆36Mar 25, 2021Updated 5 years ago
- A python approach to interacting with web shells.☆30Jan 16, 2021Updated 5 years ago
- ssshh its a secret ;)☆21Mar 7, 2022Updated 4 years ago
- ☆17Jan 2, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Probe: This is a special tool for bug hunter for automated recon process smoothly.☆24Jan 29, 2024Updated 2 years ago
- This Buffer Overflow Toolkit works through FTP, SMTP, POP, HTTP protocols as well file outputs for playlists exploiting customized variab…☆17Nov 12, 2021Updated 4 years ago
- ☆17Mar 21, 2019Updated 7 years ago
- This tool is a plugin based version checker for .NET obfuscators.☆11Jun 13, 2016Updated 9 years ago
- A general Javascript keylogger to be used in an XSS PoC☆18Feb 23, 2020Updated 6 years ago
- A Portable Executable (PE) Format poster in A1 59,4 x 84,1 cm format, including almost all of the structures from PE/PE32+ format (with c…☆21Mar 11, 2023Updated 3 years ago
- PHP ransomware that encrypts your files, as well as file and directory names.☆113Apr 25, 2023Updated 3 years ago
- Cross-Site Scripting (XSS) vulnerability analyzer☆21Feb 13, 2026Updated 2 months ago
- A simple class in C++ to load and read/write process memory, it comes with an example of how to decrypt the once popular demoscene e-zine…☆17Feb 5, 2015Updated 11 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Open source tool for static analysis of malwares.☆29Jul 10, 2020Updated 5 years ago
- Simple API for storing all incoming XSS requests and various XSS templates.☆49Jul 18, 2024Updated last year
- Simple Bash Script For Collecting Wordpress Username☆20Feb 28, 2021Updated 5 years ago
- 👓 Yet another binary vulnerbilities checker. An automated vulnerability scanner for ELF based on symbolic execution.☆34Nov 7, 2021Updated 4 years ago
- Thrift API for Xiaomi Structured Datastore Service☆13Feb 28, 2015Updated 11 years ago
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one to…☆60Apr 20, 2021Updated 5 years ago
- 👽 Metasploit is the most widely used open-source exploitation framework. Learn how to use it and unlock its full potential.☆32Dec 10, 2023Updated 2 years ago