mehulj94 / SnatchLinks
Python code to extract chrome cookie, history and login data files
☆59Updated 8 years ago
Alternatives and similar repositories for Snatch
Users that are interested in Snatch are comparing it to the libraries listed below
Sorting:
- A ctypes powered python keylogger.☆107Updated 6 years ago
- some python3 functions to add spreading features to any python backdoor☆55Updated 9 years ago
- steal cookies from firefox cookies database(cookies.sqlite)☆57Updated 10 years ago
- ssh management tool to provides commandline access to a remote system running SSH server☆75Updated 7 years ago
- Prints the IPs on your local network that're sending the most packets☆152Updated 4 years ago
- A script written lazily for generating cross-platform backdoors on the go :)☆190Updated 7 years ago
- Simple security surveillance script for linux distributions.☆59Updated 9 years ago
- Forced Man-In-The-Middle HTTPs-Avoiding Reverse Proxy☆62Updated 6 years ago
- PoC Android smart phone botnet☆79Updated 13 years ago
- A PHP Based Tool That Helps You To Manage All Your Backdoored Websites Efficiently.☆126Updated 2 years ago
- MitM pentesting opensource toolkit (scan/sniff/exploit) -- NOT SUPORTED ANYMORE --☆76Updated 9 years ago
- A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines☆29Updated 10 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆225Updated 4 years ago
- A simple bash based metasploit automation tool!☆125Updated 2 years ago
- A Cross-Platform Forensic Framework for Google Chrome☆71Updated 10 years ago
- Red Login: SSH Brute-force Tools☆106Updated 7 years ago
- A few simple scripts and templates I have used during various phishing engagements.☆59Updated 10 years ago
- Kill Any Antivirus Using Python For Windows Users .☆47Updated 9 years ago
- USB-Rubber-Ducky Payload - Mimikatz in Memory w UAC Bypass☆39Updated 10 years ago
- Social engineering tool for human hacking☆125Updated 9 years ago
- These are various simple python scripts that can be used to aid pentesters. None of these are overly complex, but should serve as a grea…☆23Updated 7 years ago
- Python backdoor that uses http post/get requests to communicate☆42Updated 9 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆148Updated 5 years ago
- The Hacker's ToolBox☆191Updated 8 years ago
- Terminator metasploit payload generator☆180Updated 7 years ago
- Advanced Hash Manipulation☆175Updated 6 years ago
- Capstone: Keylogger Trojan☆34Updated 7 years ago
- Sends some one a malicious payload through smtp and starts a listener with metasploit.☆36Updated 7 years ago
- Python script based on aireplay-ng to keep deauthenticating the specified stations from your WiFi network.☆50Updated 9 years ago
- reverseip.py - Reverse IP lookup - Find domains on the same server☆39Updated 12 years ago