Cromos is a tool for downloading legitimate extensions of the Chrome Web Store and inject codes in the background of the application.
☆126Dec 13, 2017Updated 8 years ago
Alternatives and similar repositories for cromos
Users that are interested in cromos are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 8 years ago
- Environmental (and http) keying for scripting languages☆39Oct 5, 2018Updated 7 years ago
- Collection of social engineering payloads☆299Oct 19, 2017Updated 8 years ago
- Simple script you can use to convert and obscure any IP address of any host.☆111Sep 26, 2021Updated 4 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆85Nov 7, 2020Updated 5 years ago
- A first look at browser-based Cryptojacking☆16Jun 7, 2018Updated 7 years ago
- DBC2 (DropboxC2) is a modular post-exploitation tool, composed of an agent running on the victim's machine, a controler, running on any m…☆309Oct 27, 2017Updated 8 years ago
- Various pentest scripts☆14Mar 17, 2014Updated 12 years ago
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆133May 27, 2019Updated 6 years ago
- Intelligent threat hunter and phishing servers☆47Jan 20, 2019Updated 7 years ago
- Automated Linux evil maid attack☆436Dec 22, 2015Updated 10 years ago
- A WebDAV PROPFIND C2 tool☆120Aug 27, 2019Updated 6 years ago
- Inject malicious code into *.debs☆287Apr 26, 2022Updated 4 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Nashorn Post Exploitation☆32Feb 12, 2018Updated 8 years ago
- ☆138Jul 13, 2017Updated 8 years ago
- Ip Vulnerability check to Eternal Blue , Romance , Synergy , Champion , Erraticgopher & Eagerlever☆124Nov 18, 2023Updated 2 years ago
- Protect your parents from phishing☆41Dec 4, 2017Updated 8 years ago
- A graphical security analysis tool for IoT networks☆200Apr 17, 2019Updated 7 years ago
- Simple DDE object detector☆56Nov 24, 2017Updated 8 years ago
- RedSails is a Python based post-exploitation project aimed at bypassing host based security monitoring and logging. DerbyCon 2017 Talk: h…☆307Oct 18, 2017Updated 8 years ago
- NMAP NSE that enumerates VNC authentication types☆17Dec 21, 2010Updated 15 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Mar 6, 2017Updated 9 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆944May 8, 2019Updated 6 years ago
- Microsoft Office / COM Object DLL Planting☆15May 14, 2016Updated 9 years ago
- Fucking Search Engines Scraper - python library to scrap url's from search engines☆49Sep 6, 2017Updated 8 years ago
- Encode powershell payload into bat files☆155Feb 1, 2018Updated 8 years ago
- An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector☆1,021Sep 11, 2017Updated 8 years ago
- A script written lazily for generating cross-platform backdoors on the go :)☆190Oct 16, 2018Updated 7 years ago
- The Python Password-Protected Obfuscator☆33Jul 7, 2019Updated 6 years ago
- JavaScript Reversed TCP Meterpreter Stager☆138May 25, 2017Updated 8 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆16Nov 8, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- PLASMA PULSAR☆70May 19, 2017Updated 8 years ago
- Shodanwave is a tool for exploring and obtaining information from Netwave IP Camera.☆267Nov 15, 2020Updated 5 years ago
- EGESPLOIT is a golang library for malware development☆339Jan 26, 2017Updated 9 years ago
- Deploy payloads to *Nix systems en masse☆108Apr 24, 2020Updated 6 years ago
- Ruby Oracle Security Scanner☆16Jul 9, 2012Updated 13 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆99Nov 29, 2017Updated 8 years ago
- Empire HTTP(S) C2 redirector setup script☆48Jul 10, 2018Updated 7 years ago