illera88 / GCC-stealer
Google Chrome Cookies Stealer. Steals Chrome cookies
☆42Updated last year
Alternatives and similar repositories for GCC-stealer:
Users that are interested in GCC-stealer are comparing it to the libraries listed below
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- A C2 framework built for my bachelors thesis☆55Updated 5 months ago
- execute PE in memory Filelessly☆33Updated 2 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆76Updated last year
- Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , …☆27Updated 2 years ago
- LNK-Dropper Builder☆22Updated 3 weeks ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated 11 months ago
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆109Updated last year
- quick and dirty proof-of-concept to hide shells in images☆49Updated 9 months ago
- Public repo of some woking evilginx phishlets☆32Updated 5 months ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆60Updated 9 months ago
- RegStrike is a .reg payload generator☆58Updated last year
- PowerShell script to generate ShellCode in various formats☆41Updated 6 months ago
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆24Updated 4 months ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 2 years ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆75Updated last month
- Social Engineering Browser Update Attack.☆57Updated last year
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated 8 months ago
- An updated version of keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard in…☆104Updated last year
- ☆17Updated last year
- ECC Public Key Cryptography☆37Updated last year
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆29Updated last year
- Simple python script to evade antiviruses on fully patched and updated Windows environments using a py2exe.☆18Updated 2 years ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆95Updated last year
- A repository with my code snippets for research/education purposes.☆50Updated last year
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆46Updated 2 months ago
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆162Updated last year
- Encodes a payload within a generated mock-CSS file☆59Updated last year
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆82Updated last year