The decryption implementation of Chrome cookie(encrypted_value) and password(password_value) on Windows with Java
☆24Aug 13, 2021Updated 4 years ago
Alternatives and similar repositories for chrome-cookie-password-decryption
Users that are interested in chrome-cookie-password-decryption are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- python ShellCode Loader (Cobaltstrike&Metasploit)☆20Nov 28, 2019Updated 6 years ago
- CobaltStrike AggressorScripts for the lazy☆10Jul 22, 2022Updated 3 years ago
- Only for research and learning, not for commercial and illegal use☆11Jul 22, 2019Updated 6 years ago
- Non organized Cpp code files I used for my research on Windows☆28Aug 9, 2020Updated 5 years ago
- Java XMLDecoder payload generator☆16Jul 27, 2021Updated 4 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Python script for steal browser cookies☆67May 27, 2020Updated 5 years ago
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Jun 28, 2023Updated 2 years ago
- Use powershell to getsystem with token dumplication☆10Dec 6, 2019Updated 6 years ago
- 后渗透持久化控制平台; Windows Persistence Platform;☆46Sep 16, 2021Updated 4 years ago
- Automatic credential collection☆21Aug 17, 2022Updated 3 years ago
- A collection of Cobalt Strike aggressor scripts☆17Jul 7, 2020Updated 5 years ago
- phpstudy(2016/2018) backdoor rce☆47Oct 2, 2019Updated 6 years ago
- ☆12May 30, 2019Updated 6 years ago
- ☆10May 27, 2015Updated 10 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- C# code to run shellcode in a sneaky way☆93Oct 2, 2020Updated 5 years ago
- ☆36Mar 11, 2019Updated 7 years ago
- AggressorScript-UploadAndRunFrp/上传frpc并且运行frpc☆63Sep 1, 2019Updated 6 years ago
- WebShell高效爆破字典生成☆28Mar 30, 2020Updated 6 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆31Oct 1, 2015Updated 10 years ago
- 轻量级漏洞验证和利用框架☆32May 10, 2022Updated 3 years ago
- Automatic DLL comment link generation and explaination of the DLL Proxying techniques☆10Aug 19, 2021Updated 4 years ago
- I used this to see if an EDR is running in Safe Mode☆36Feb 13, 2021Updated 5 years ago
- python3 写的一些权限维持脚本☆38Feb 10, 2020Updated 6 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Call your own DLL from VBA and execute code under process svchost.exe with WMI☆12Mar 6, 2020Updated 6 years ago
- Easily write tests and fuzz many different programs.☆12Dec 13, 2022Updated 3 years ago
- Wazuh - Virtual Machines (OVA and AMI)☆21Updated this week
- ☆36Sep 7, 2020Updated 5 years ago
- Windows hack programming skills and common modules / Windows hack 编程技巧及通用模块☆23Dec 8, 2019Updated 6 years ago
- about CobaltStrike☆150Dec 1, 2023Updated 2 years ago
- 窃取mstsc中的用户明文凭据☆47Apr 23, 2021Updated 5 years ago
- A Simple ShellcodeLoader☆11Jun 4, 2021Updated 4 years ago
- 从入门到放弃的产物,学习过程中用python实现的一个单点c2基本功能☆11Mar 11, 2020Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A collection of Cobalt Strike Malleable C2 profiles☆36Oct 13, 2020Updated 5 years ago
- A script to obfuscate powershell payloads , bypassing AMSI.dll and Windows Defender☆37Sep 28, 2019Updated 6 years ago
- Go command line app to exploit file upload vulnerability☆12Feb 8, 2017Updated 9 years ago
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆14Mar 29, 2017Updated 9 years ago
- 寻找可注入进程☆13Jul 16, 2020Updated 5 years ago
- Open source tool that uses censys and shodan for passive recon.☆13May 20, 2016Updated 9 years ago
- 亿赛通解密工具☆11Jan 10, 2024Updated 2 years ago