mrd0x / WebView2-Cookie-StealerLinks
☆266Updated 3 years ago
Alternatives and similar repositories for WebView2-Cookie-Stealer
Users that are interested in WebView2-Cookie-Stealer are comparing it to the libraries listed below
Sorting:
- Collection of script templates to create infinite UAC prompts forcing a user to run as admin ⚠☆117Updated this week
- Malicious Shortcut(.lnk) Generator☆201Updated 7 years ago
- .NET Antivirus Evasion Tool (Exe2Bat)☆39Updated 3 years ago
- ⚡ Create infinite UAC prompts forcing a user to run as admin ⚡☆248Updated 3 years ago
- Cross-platform post-exploitation HTTP Command & Control agent written in golang☆112Updated 9 months ago
- PowerShell Asynchronous TCP Reverse Shell☆158Updated 2 months ago
- 「🛡️」AVs/EDRs Evasion tool☆103Updated last year
- JustEvadeBro, a cheat sheet which will aid you through AMSI/AV evasion & bypasses.☆314Updated 2 months ago
- RDPCredentialStealer it's a malware that steal credentials provided by users in RDP using API Hooking with Detours in C++☆259Updated 2 years ago
- Simple reverse shell to avoid Win 11 defender detection☆122Updated 4 years ago
- All my Source Codes (Repos) for Red-Teaming & Pentesting + Blue Teaming☆234Updated last year
- Revenant - A 3rd party agent for Havoc that demonstrates evasion techniques in the context of a C2 framework☆389Updated last year
- Generate an obfuscated DLL that will disable AMSI & ETW☆329Updated last year
- Generate FUD backdoors☆262Updated 2 years ago
- This POC gives you the possibility to compile a .exe to completely avoid statically detection by AV/EPP/EDR of your C2-shellcode and down…☆256Updated 2 years ago
- Process Ghosting in C#☆219Updated 4 years ago
- Our Friendly Gmail will act as Server and implant will exfiltrate data via smtp and will read commands from C2 (Gmail) via imap protocol☆265Updated 4 months ago
- A standalone DLL that exports databases in cleartext once injected in the KeePass process.☆302Updated 2 years ago
- WindowSpy is a Cobalt Strike Beacon Object File meant for automated and targeted user surveillance.☆281Updated 11 months ago
- Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic lo…☆270Updated 3 years ago
- It bridges my research with a functional tool. I want to provide a safe, open-source framework for hackers to test evasion and for defend…☆281Updated 2 weeks ago
- .NET executable to use when dealing with privilege escalation on Windows to gain local administrator access☆159Updated 3 years ago
- ☆335Updated 2 years ago
- Modules used by the Havoc Framework☆264Updated last year
- A better version of Xencrypt.Xencrypt it self is a Powershell runtime crypter designed to evade AVs.☆224Updated 4 years ago
- Tricks the target into enabling content (macros) with fake messages. Once enabled, uses macros to reduce the risk of suspision from targe…☆173Updated 11 months ago
- An in-depth approach to obfuscating the individual components of a PowerShell payload whether you're on Windows or Kali Linux.☆283Updated 3 years ago
- A keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard input hook, allowing i…☆398Updated 2 years ago
- Windows Local Privilege Escalation via CdpSvc service (Writeable SYSTEM path Dll Hijacking)☆254Updated 3 years ago
- A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educat…☆89Updated 4 months ago