noperator / chromedbLinks
Read Chromium data (namely, cookies and local storage) straight from disk, without spinning up the browser.
☆131Updated 5 months ago
Alternatives and similar repositories for chromedb
Users that are interested in chromedb are comparing it to the libraries listed below
Sorting:
- Protection against HTML smuggling attacks.☆99Updated 3 months ago
- A fork of the Go language with some tweaks☆52Updated 8 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40Updated 2 years ago
- Find what egress ports are allowed☆42Updated 2 years ago
- Hijack a slack bot to phish your way in☆57Updated 3 months ago
- Putting a leash on naughty AWS permissions☆130Updated last month
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆102Updated 4 months ago
- gubble is a tool designed to audit Google Workspace group settings. It analyzes settings such as who can join, view membership, post mess…☆79Updated 4 months ago
- Fingerprint-aware TLS reverse proxy. Use Finch to outsmart bad traffic—collect client fingerprints (JA3, JA4 +QUIC, JA4H, HTTP/2) and act…☆237Updated 2 months ago
- Modular web-application honeypot platform built using go and gin☆60Updated last year
- 📡 802.11 broadcast analyzer & injector☆162Updated 4 months ago
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆57Updated 3 months ago
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆74Updated last month
- Secret Scanner for Slack, Jira, Confluence, Asana, Wrike, Linear, Zendesk, GitHub, and GitLab☆68Updated last week
- A fast, customizable service detection tool powered by a flexible fingerprint system. It helps you identify services, APIs, and network c…☆40Updated 8 months ago
- A tool designed for smuggling interactive command and control traffic through legitimate TURN servers hosted by reputable providers such …☆330Updated 2 months ago
- Fragtunnel is a proof-of-concept (PoC) TCP tunnel tool that you can use to tunnel your application's traffic and bypass next-generation f…☆211Updated last year
- Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephe…☆355Updated 3 weeks ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated last year
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆71Updated this week
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆40Updated 6 months ago
- Identify hardcoded secrets in static structured text (version 2)☆94Updated 8 months ago
- Tail Certificate Transparency logs and extract hostnames☆124Updated 4 months ago
- A multifaceted security tool which leverages Public GitHub REST APIs for OSINT, Forensics, Pentesting and more.☆161Updated 2 months ago
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆83Updated last year
- Canary Detection☆187Updated this week
- A Golang package for scanning private and public IPs for open TCP ports 👁️☆116Updated 7 months ago
- PWN is an open security automation framework that aims to stand on the shoulders of security giants, promoting trust and innovation.☆67Updated this week
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services …☆102Updated 6 months ago
- CaptainCredz is a modular and discreet password-spraying tool.☆132Updated 3 months ago