noperator / chromedbLinks
Read Chromium data (namely, cookies and local storage) straight from disk, without spinning up the browser.
☆127Updated 2 months ago
Alternatives and similar repositories for chromedb
Users that are interested in chromedb are comparing it to the libraries listed below
Sorting:
- A fork of the Go language with some tweaks☆51Updated 6 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40Updated 2 years ago
- Protection against HTML smuggling attacks.☆96Updated 3 weeks ago
- Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephe…☆210Updated last month
- Find what egress ports are allowed☆42Updated 2 years ago
- Hijack a slack bot to phish your way in☆55Updated 2 weeks ago
- Putting a leash on naughty AWS permissions☆127Updated 3 months ago
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆98Updated 2 months ago
- gubble is a tool designed to audit Google Workspace group settings. It analyzes settings such as who can join, view membership, post mess…☆79Updated 2 months ago
- Secrets Ninja is an GUI tool for validating & investigating API keys discovered during pentesting & bug bounty hunting.☆79Updated 2 weeks ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆66Updated last year
- GitHub Actions Cache Native Malware - for Educational and Research Purposes only.☆68Updated 3 months ago
- Automated vulnerability discovery and annotation☆67Updated last year
- Burp Suite extension for testing Passkey systems.☆71Updated 4 months ago
- Secret Scanner for Slack, Jira, Confluence, Asana, Wrike, Linear, Zendesk, GitHub, and GitLab☆64Updated last month
- Ebyte-Go-Morpher is a Go program that parses, analyzes, and rewrites Go source code to apply multiple layers of obfuscation. It operates …☆80Updated 2 weeks ago
- Burp Suite extension for bypassing client-side encryption for pentesting and bug bounty in WebSocket☆80Updated last month
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆37Updated 3 months ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated 10 months ago
- CaptainCredz is a modular and discreet password-spraying tool.☆120Updated last week
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆64Updated last month
- 🌐 Visualize and explore IaC ✒️ Create and share notes in VS Code 🤝 Sync notes and findings in real-time with friends☆73Updated last year
- Fragtunnel is a proof-of-concept (PoC) TCP tunnel tool that you can use to tunnel your application's traffic and bypass next-generation f…☆189Updated last year
- A Pentest Collaboration and Reporting Tool☆62Updated 4 months ago
- Canary Detection☆186Updated 2 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆85Updated 4 months ago
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆43Updated 3 weeks ago
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆49Updated 4 months ago
- A fast, customizable service detection tool powered by a flexible fingerprint system. It helps you identify services, APIs, and network c…☆40Updated 5 months ago
- PWN is an open security automation framework that aims to stand on the shoulders of security giants, promoting trust and innovation.☆66Updated this week