noperator / chromedbLinks
Read Chromium data (namely, cookies and local storage) straight from disk, without spinning up the browser.
☆132Updated 6 months ago
Alternatives and similar repositories for chromedb
Users that are interested in chromedb are comparing it to the libraries listed below
Sorting:
- Protection against HTML smuggling attacks.☆99Updated 4 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40Updated 2 years ago
- A fork of the Go language with some tweaks☆52Updated 9 months ago
- Putting a leash on naughty AWS permissions☆132Updated 2 months ago
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆104Updated 5 months ago
- gubble is a tool designed to audit Google Workspace group settings. It analyzes settings such as who can join, view membership, post mess…☆79Updated 5 months ago
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆39Updated 6 months ago
- Hijack a slack bot to phish your way in☆57Updated 3 months ago
- Find what egress ports are allowed☆43Updated 2 years ago
- Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephe…☆413Updated last month
- Secret Scanner for Slack, Jira, Confluence, Asana, Wrike, Linear, Zendesk, GitHub, and GitLab☆69Updated 3 weeks ago
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆57Updated 4 months ago
- Fingerprint-aware TLS reverse proxy. Use Finch to outsmart bad traffic—collect client fingerprints (JA3, JA4 +QUIC, JA4H, HTTP/2) and act…☆246Updated last week
- Modular web-application honeypot platform built using go and gin☆60Updated last year
- A Golang package for scanning private and public IPs for open TCP ports 👁️☆116Updated 8 months ago
- ☆38Updated 3 weeks ago
- A fast, customizable service detection tool powered by a flexible fingerprint system. It helps you identify services, APIs, and network c…☆41Updated 9 months ago
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services …☆103Updated 7 months ago
- Fragtunnel is a proof-of-concept (PoC) TCP tunnel tool that you can use to tunnel your application's traffic and bypass next-generation f…☆211Updated last year
- Eve is a JAMF exploitation toolkit used to interact with locally hosted JAMF servers and those hosted on jamfcloud.com.☆38Updated last month
- Ebyte-Go-Morpher is a Go program that parses, analyzes, and rewrites Go source code to apply multiple layers of obfuscation. It operates …☆118Updated 3 months ago
- Tail Certificate Transparency logs and extract hostnames☆124Updated 4 months ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated last year
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Updated last year
- PWN is an open security automation framework that aims to stand on the shoulders of security giants, promoting trust and innovation.☆67Updated this week
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆74Updated 2 months ago
- Canary Detection☆188Updated 3 weeks ago
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆71Updated last week
- Self-contained script for cleaning forensic traces on Linux, macOS, and Windows.☆114Updated 3 months ago
- CaptainCredz is a modular and discreet password-spraying tool.☆132Updated 3 months ago