mehulj94 / SnatchLinks
Python code to extract chrome cookie, history and login data files
☆59Updated 8 years ago
Alternatives and similar repositories for Snatch
Users that are interested in Snatch are comparing it to the libraries listed below
Sorting:
- A ctypes powered python keylogger.☆107Updated 6 years ago
- some python3 functions to add spreading features to any python backdoor☆55Updated 8 years ago
- steal cookies from firefox cookies database(cookies.sqlite)☆55Updated 10 years ago
- A script written lazily for generating cross-platform backdoors on the go :)☆190Updated 7 years ago
- Prints the IPs on your local network that're sending the most packets☆152Updated 4 years ago
- ssh management tool to provides commandline access to a remote system running SSH server☆75Updated 7 years ago
- Linux backdoor implementation written in Python☆58Updated 10 years ago
- A PHP Based Tool That Helps You To Manage All Your Backdoored Websites Efficiently.☆126Updated 2 years ago
- The Hacker's ToolBox☆191Updated 8 years ago
- Capstone: Keylogger Trojan☆34Updated 7 years ago
- PoC Android smart phone botnet☆79Updated 13 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆225Updated 4 years ago
- Red Login: SSH Brute-force Tools☆106Updated 7 years ago
- reverseip.py - Reverse IP lookup - Find domains on the same server☆39Updated 11 years ago
- Social engineering tool for human hacking☆125Updated 9 years ago
- Kill Any Antivirus Using Python For Windows Users .☆47Updated 9 years ago
- MitM pentesting opensource toolkit (scan/sniff/exploit) -- NOT SUPORTED ANYMORE --☆75Updated 9 years ago
- USB-Rubber-Ducky Payload - Mimikatz in Memory w UAC Bypass☆37Updated 10 years ago
- A simple bash based metasploit automation tool!☆125Updated 2 years ago
- Forced Man-In-The-Middle HTTPs-Avoiding Reverse Proxy☆62Updated 6 years ago
- A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines☆29Updated 10 years ago
- Phishing webapp generator☆42Updated 7 years ago
- Terminator metasploit payload generator☆180Updated 7 years ago
- Small backdoor using cookie.☆63Updated 9 years ago
- Show info about the author by facebook photo url☆40Updated 8 years ago
- Simple security surveillance script for linux distributions.☆59Updated 8 years ago
- A few simple scripts and templates I have used during various phishing engagements.☆59Updated 10 years ago
- Pythonic ransomware proof of concept.☆220Updated 5 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆148Updated 4 years ago
- Create a worm that bruteforces SSH and "infect" the system.☆26Updated 8 years ago