Google Chrome Cookies Stealer. Steals Chrome cookies
☆49Nov 9, 2023Updated 2 years ago
Alternatives and similar repositories for GCC-stealer
Users that are interested in GCC-stealer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- My journey and notes on learning Offensive Security from the ground up☆21Dec 22, 2025Updated 3 months ago
- A Ruby micro-framework for writing and running exploit payloads☆23Jan 16, 2026Updated 3 months ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Nov 8, 2022Updated 3 years ago
- Apache Superset Auth Bypass (CVE-2023-27524)☆11May 9, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- RDPCredentialStealer it's an implant that steal credentials provided by users in RDP using API Hooking with Detours in C++☆267Mar 11, 2026Updated last month
- Splitting and executing shellcode across multiple pages☆104Jun 8, 2023Updated 2 years ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆25Jul 14, 2024Updated last year
- C# loader capable of running stage-1 from remote url, file path as well as file share☆15Feb 8, 2023Updated 3 years ago
- This python program gets all the saved passwords, credit cards and bookmarks from chromium based browsers supports chromium 80 and above!☆11Aug 27, 2022Updated 3 years ago
- Shellcode execution via x86 inline assembly based on MSVC syntax☆17Apr 26, 2023Updated 2 years ago
- Exploits for CVE-2023-27327 and CVE-2023-27328☆14May 9, 2023Updated 2 years ago
- Hiding shellcode in plain sight within a large memory region. Inspired by technique used by Raspberry Robin's Roshtyak☆211Nov 12, 2025Updated 5 months ago
- Stealthy .NET assembly loading using AssemblyNative::LoadFromBuffer☆56Mar 22, 2026Updated 3 weeks ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Just another ntdll unhooking using Parun's Fart technique☆76Feb 15, 2023Updated 3 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆22Jun 11, 2022Updated 3 years ago
- A Python Script that can DOS or ShutDown WiFI Network☆11Apr 11, 2022Updated 4 years ago
- Select any exported function in a dll as the new dll's entry point.☆82Oct 25, 2024Updated last year
- This is a Sharp assembly loader in PowerShell☆13Oct 23, 2025Updated 5 months ago
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆55May 8, 2023Updated 2 years ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Feb 12, 2023Updated 3 years ago
- Ping2death is a ddos to send packet over a user.. Its has a custom amount of packet☆15Sep 22, 2021Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A repository with my code snippets for research/education purposes.☆53Jul 28, 2023Updated 2 years ago
- Vulnerability analysis and proof of concepts☆40May 15, 2023Updated 2 years ago
- A command line tool to interact with Microsoft Graph API☆23May 27, 2024Updated last year
- All my POC related to malware development☆15Feb 19, 2026Updated 2 months ago
- ☆11Aug 31, 2023Updated 2 years ago
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- Heap encryption in Nim☆21Aug 25, 2024Updated last year
- Reverse engineering project on stream☆13Mar 19, 2021Updated 5 years ago
- CVE-2023-28121 - WooCommerce Payments < 5.6.2 - Unauthenticated Privilege Escalation [ Mass Add Admin User ]☆12Jul 14, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- some AV / EDR / analysis studies☆10May 21, 2023Updated 2 years ago
- badger-builder is an AI-assisted tool for generating dynamic Brute Ratel C4 profiles☆54Nov 21, 2024Updated last year
- Distributed phishing framework designed to streamline offensive security phishing☆41Feb 16, 2023Updated 3 years ago
- QNAP N-Day (Probably not CVE-2020-2509)☆14Jul 27, 2022Updated 3 years ago
- ☆39May 20, 2023Updated 2 years ago
- Analysis of syscall sequence pattern from exploit codes for advanced system call sequence filtering for enhanced container security☆16May 21, 2023Updated 2 years ago
- My Favorite Offensive Security Scripts☆89Apr 25, 2025Updated 11 months ago