kdirectorate / browserscanLinks
Python application to scan user's installed browsers for secrets such as stored passwords and cookies.
☆14Updated 4 years ago
Alternatives and similar repositories for browserscan
Users that are interested in browserscan are comparing it to the libraries listed below
Sorting:
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆18Updated last year
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 5 years ago
- ☆25Updated 3 years ago
- 🔎 Help find Trojan Source vulnerability in code 👀 . Useful for code review in project with multiple collaborators (CI/CD)☆47Updated 2 years ago
- A tool written in Go that scans files & directories for the Follina exploit (CVE-2022-30190)☆24Updated 3 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆13Updated 5 years ago
- Exploit for win10 SMB3.1☆17Updated 5 years ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆14Updated 6 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆32Updated 3 years ago
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆68Updated 6 years ago
- Site fast fuzzing with chorme extension.☆24Updated 3 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 3 years ago
- A redteam tool to obfuscate IPv4 addresses to evade AV or Application Firewalls☆18Updated 5 years ago
- PAM Backdoor☆33Updated 2 years ago
- ☆18Updated 3 years ago
- the metasploit script(POC/EXP) about CVE-2021-22005 VMware vCenter Server contains an arbitrary file upload vulnerability☆23Updated 4 years ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆48Updated 3 years ago
- ☆42Updated 9 months ago
- Sp00fer blog post -☆24Updated 3 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Updated 3 years ago
- Advanced threat detection solution for Linux.☆36Updated 5 years ago
- This module exploits a vulnerability in WinRAR (CVE-2023-38831). When a user opens a crafted RAR file and its embedded document, a script…☆15Updated 2 years ago
- wordlists for password cracking☆28Updated 3 years ago
- Transform your batch (bat) script into one binary.exe☆51Updated last year
- post exploitation user monitoring tool☆20Updated 7 years ago
- 📡 Ease file sharing during pentest/CTF 🎸☆11Updated 3 years ago
- Unpacking tool for the zipExec Crypter☆14Updated 4 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Updated 5 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Updated last year
- recover Firefox and more browsers logins☆48Updated 4 years ago