Read Chromium data (namely, cookies and local storage) straight from disk, without spinning up the browser.
☆135May 7, 2025Updated 9 months ago
Alternatives and similar repositories for chromedb
Users that are interested in chromedb are comparing it to the libraries listed below
Sorting:
- A simple mitmproxy blueprint to intercept HTTPS traffic from app running on Kubernetes☆75Apr 14, 2025Updated 10 months ago
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆39Sep 25, 2024Updated last year
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 7 months ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Dec 12, 2023Updated 2 years ago
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆287May 16, 2025Updated 9 months ago
- RedFlag uses AI to identify high-risk code changes. Run it in batch mode for release candidate testing or in CI pipelines to flag PRs and…☆159Nov 21, 2024Updated last year
- Java archive implant toolkit.☆61Apr 20, 2025Updated 10 months ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- Proof-of-concept modular implant platform leveraging v8☆54Mar 4, 2025Updated 11 months ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- Steganography Tool for JPG Images☆64Updated this week
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆106Nov 24, 2023Updated 2 years ago
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆34Jan 27, 2026Updated last month
- A fork of the Go language with some tweaks☆56Jan 29, 2025Updated last year
- 🌒 Shell command obfuscation to avoid detection systems☆122Oct 10, 2022Updated 3 years ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆56Jun 30, 2021Updated 4 years ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆84Jan 30, 2026Updated last month
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55May 7, 2025Updated 9 months ago
- Identify hardcoded secrets in static structured text (version 2)☆98Feb 5, 2025Updated last year
- A Terraform module that makes it a snap to opt out of all AWS AI/ML data harvesting.☆30Jan 2, 2024Updated 2 years ago
- ☆27May 6, 2024Updated last year
- Security Alert Decoration☆27Jul 21, 2025Updated 7 months ago
- This tool analyzes a given Gitlab repository and searches for dangling or force-pushed commits containing potential secret or interesting…☆47Aug 16, 2024Updated last year
- moniorg is a tool that leverages crt.sh website to monitor domains of a target☆47Apr 1, 2023Updated 2 years ago
- A new approach to Browser In The Browser (BITB) without the use of iframes, allowing the bypass of traditional framebusters implemented b…☆441May 29, 2024Updated last year
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆117Updated this week
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40May 7, 2023Updated 2 years ago
- An AWS metadata enumeration tool by Plerion☆101Feb 12, 2024Updated 2 years ago
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Sep 15, 2023Updated 2 years ago
- Addon for BHCE☆58Apr 1, 2025Updated 11 months ago
- Protect against subdomain takeover☆95Jul 20, 2025Updated 7 months ago
- A GitHub Actions Supply Chain CTF / Goat☆27Jan 6, 2026Updated last month
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Jan 18, 2022Updated 4 years ago
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆60Jul 13, 2025Updated 7 months ago
- This repository contains an IDA processor for loading and disassembling compiled yara rules.☆44Dec 31, 2024Updated last year
- Rules shared by the community from 100 Days of YARA 2025☆38Jan 2, 2026Updated 2 months ago
- FlowAnalyzer is a tool to help in testing and analyzing OAuth 2.0 Flows, including OpenID Connect (OIDC).☆181Jul 8, 2024Updated last year
- A simple touchID prompt'er for use in shell scripts.☆99Jun 18, 2024Updated last year