kdirectorate / browserscan
Python application to scan user's installed browsers for secrets such as stored passwords and cookies.
☆12Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for browserscan
- fully automated c# reverse shells with automated ssh tunneling☆5Updated 3 years ago
- Recon-ng modules for basic OSINT.☆10Updated 2 years ago
- Multiplatform Telegram Bot in pure PowerShell☆47Updated last year
- ☆10Updated 6 years ago
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆17Updated this week
- Local Privilege Escalation Miner☆23Updated 2 years ago
- Just Enough C2 - A simple but effective server and implant☆9Updated 2 years ago
- A golang tool that uses the dehashed.com API to search for compromised assets.☆8Updated 3 years ago
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆9Updated 6 years ago
- miscellaneous sploit scripts/hacks☆14Updated 4 months ago
- ☆14Updated 2 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 4 years ago
- A Fast & free Windows remote administration tool.☆10Updated 2 years ago
- Sp00fer blog post -☆25Updated 2 years ago
- Disable Windows Defender All Version☆31Updated 3 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- A malicious .cab creation tool for CVE-2021-40444☆12Updated 3 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 2 years ago
- Shadow Strike is a hacking framework that aids in information gathering, payload generation, payload delivery, and website exploitation.☆8Updated 3 years ago
- Emulate the handshake packets of an RDP server with python☆15Updated 6 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated last month
- Launch a Windows EXE file with this EXE file (application filter evasion)☆11Updated 7 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits key☆28Updated 5 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆9Updated 2 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated last year