π Google Chrome password recovery tool written using Powershell and a tiny bit of Batch!
β16Jul 15, 2019Updated 6 years ago
Alternatives and similar repositories for ChromePasswordDumper
Users that are interested in ChromePasswordDumper are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- a basic IDE compiler for C# and VB.NET using codedomβ44Sep 22, 2019Updated 6 years ago
- Create, View, Edit and delete pastes hosted at rentry.org using batch file. rentry.org is markdown-powered pastebin/publishing serviceβ13Oct 30, 2022Updated 3 years ago
- It exploits the chrome vulnerability and gets the all saved credentials in chromeβ10Jun 22, 2020Updated 5 years ago
- Two C# RunPE's capable of x86 and x64 injectionsβ11Dec 2, 2018Updated 7 years ago
- Decrypt Matrix42 Empirum /EIS Passwordsβ14Mar 31, 2021Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient β’ AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Original hVNC has been recoded to work with all version of windows above XP. Thanks to the original author for this wonderful tool.β10Oct 13, 2021Updated 4 years ago
- Dream All In One Solutionβ17Jul 28, 2017Updated 8 years ago
- Techniques that i have used to evade anti-virus during pen tests.β13May 29, 2018Updated 7 years ago
- Squid and Stunnel assembled as a proxy serverβ12Mar 2, 2017Updated 9 years ago
- β146Aug 26, 2019Updated 6 years ago
- AspXVenom automates the process of generating encoded shellcode and embedding it into ASPX webshells, providing a smooth workflow for penβ¦β18Mar 19, 2025Updated last year
- β14Apr 20, 2026Updated 2 weeks ago
- Utility to generate a TLS Certificate.β17Apr 11, 2020Updated 6 years ago
- β20Jan 8, 2026Updated 3 months ago
- Deploy on Railway without the complexity - Free Credits Offer β’ AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Detect virtual environmentβ65Apr 25, 2019Updated 7 years ago
- using VBS to download and install a powershell malwareβ37Jun 28, 2019Updated 6 years ago
- Kill AMSI in a remote process PoCβ10Aug 18, 2018Updated 7 years ago
- β11Apr 23, 2019Updated 7 years ago
- Runpe + DInvoke + Syscallβ16Jun 18, 2021Updated 4 years ago
- Make your Batchfiles unreadable.β10Dec 29, 2018Updated 7 years ago
- A Patchless AMSI Bypass Technique using VEHΒ²β32Jun 22, 2025Updated 10 months ago
- UAC Bypass exploit for x64 Windows 10 machines, still not patched.β17Jun 25, 2020Updated 5 years ago
- A Windows 11 Rootkit. (Exploit has been patched)β17Sep 7, 2025Updated 7 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer β’ AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.β11Aug 2, 2021Updated 4 years ago
- β13Jun 1, 2021Updated 4 years ago
- Nice try reading NTDLL from disk, nerd.β19Apr 18, 2022Updated 4 years ago
- Where-to-fly is an Android and Windows app that helps decide where to (hike up and) fly with a paraglider.β11Apr 28, 2026Updated last week
- β14Sep 22, 2019Updated 6 years ago
- Misery Loader to bypass modern EDR solutionsβ19Dec 20, 2024Updated last year
- Clr Injection for x64 and x86. Inject C# into Managed or Unmanaged Processes.β19Sep 7, 2024Updated last year
- Use powershell to getsystem with token dumplicationβ10Dec 6, 2019Updated 6 years ago
- β13Aug 18, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer β’ AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Easily find FiveM server's IP addressβ26Mar 29, 2023Updated 3 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, iβ¦β19Jan 28, 2022Updated 4 years ago
- A simple reverse shell in Nim langauge. It should bypass AV-s (don't submit binaries)β16Oct 10, 2019Updated 6 years ago
- Backdoor Visual Studio project files with custom shellcode, which executes whenever the project is opened or built.β36Updated this week
- This script allows us to perform an execution in the memory of the device without leaving traces for forensic analysts after its executioβ¦β12May 12, 2022Updated 3 years ago
- I created my own Keylogger I am going to open source its code .But no one is allowed to use it commercially and I have actual copy rightβ¦β11Sep 30, 2017Updated 8 years ago
- Official Monkey Studio IDE Source Code.β15Dec 18, 2016Updated 9 years ago