Harden your Chrome browser via enterprise policy.
☆294Mar 4, 2023Updated 3 years ago
Alternatives and similar repositories for ChromeGalvanizer
Users that are interested in ChromeGalvanizer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Chrome-extension implant that turns victim Chrome browsers into fully-functional HTTP proxies, allowing you to browse sites as your victi…☆1,701Oct 26, 2024Updated last year
- A Chrome extension static analysis tool to help aide in security reviews.☆162Aug 15, 2023Updated 2 years ago
- Fixes and patches☆20Dec 3, 2020Updated 5 years ago
- ☆16Dec 7, 2025Updated 3 months ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Jan 18, 2022Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆24Oct 18, 2022Updated 3 years ago
- ☆74May 21, 2020Updated 5 years ago
- Web on top of any protocol☆113Apr 29, 2020Updated 5 years ago
- ☆10Nov 24, 2018Updated 7 years ago
- Obtains a crackable hash for the current user account☆23Feb 3, 2019Updated 7 years ago
- ☆15Jul 20, 2022Updated 3 years ago
- ☆67Dec 19, 2018Updated 7 years ago
- Discord C2 Profile for Mythic☆32Feb 18, 2025Updated last year
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆32Mar 8, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Neat URL cleans URLs, removing parameters such as Google Analytics' utm parameters.☆659Apr 2, 2025Updated 11 months ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Mar 1, 2023Updated 3 years ago
- Keyhack - Golang API token/webhook validator☆16Mar 20, 2025Updated last year
- ☆48Nov 13, 2021Updated 4 years ago
- A tool that implements the Golden SAML attack☆341Oct 15, 2018Updated 7 years ago
- DNS covert channel implant for Red Teams.☆734Jan 10, 2020Updated 6 years ago
- ☆98Feb 21, 2019Updated 7 years ago
- Secretly record audio and video with chromium based browsers.☆24Feb 14, 2024Updated 2 years ago
- A CLI tool which can be used to inject JavaScript into arbitrary Chrome origins via the Chrome DevTools Protocol☆46Jan 18, 2021Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Targeted Payload Execution☆100Apr 9, 2020Updated 5 years ago
- Simple password crackers used for salted and unsalted passwords encrypted with MD5, SHA-1, and SHA-256 algorithms.☆15Dec 10, 2019Updated 6 years ago
- Swift code to run a dylib on disk☆16May 9, 2022Updated 3 years ago
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Jan 6, 2022Updated 4 years ago
- Nameserver DNS poisoning attacks made easy☆524Feb 26, 2017Updated 9 years ago
- JXA and swift code that can perform some macOS situational awareness without generating TCC prompts.☆40Apr 20, 2022Updated 3 years ago
- Yet another cross compiling reverse/bind payload generator written in Go.☆12Sep 22, 2021Updated 4 years ago
- ☆18Aug 15, 2021Updated 4 years ago
- Collection of PowerShell scripts☆450Dec 18, 2017Updated 8 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆13Jun 1, 2021Updated 4 years ago
- A graph-based tool for visualizing effective access and resource relationships in AWS environments.☆1,000Oct 4, 2022Updated 3 years ago
- ☆19Oct 5, 2020Updated 5 years ago
- Correlated injection proxy tool for XSS Hunter☆259Dec 26, 2022Updated 3 years ago
- A Red Team tool for exfiltrating sensitive data from Confluence pages.☆114Feb 21, 2023Updated 3 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Mar 9, 2021Updated 5 years ago
- GitLab Attack TOolkit☆34Oct 8, 2025Updated 5 months ago