noperator / chromedbLinks
Read Chromium data (namely, cookies and local storage) straight from disk, without spinning up the browser.
☆134Updated 8 months ago
Alternatives and similar repositories for chromedb
Users that are interested in chromedb are comparing it to the libraries listed below
Sorting:
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40Updated 2 years ago
- Find what egress ports are allowed☆45Updated last month
- Protection against HTML smuggling attacks.☆100Updated 5 months ago
- Secret Scanner for Slack, Jira, Confluence, Asana, Wrike, Linear, Zendesk, GitHub, and GitLab☆69Updated 2 weeks ago
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆107Updated 7 months ago
- Putting a leash on naughty AWS permissions☆132Updated 4 months ago
- A fork of the Go language with some tweaks☆52Updated 11 months ago
- Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephe…☆426Updated 3 months ago
- Hijack a slack bot to phish your way in☆57Updated 5 months ago
- Modular web-application honeypot platform built using go and gin☆63Updated last year
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆59Updated 5 months ago
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆43Updated 8 months ago
- gubble is a tool designed to audit Google Workspace group settings. It analyzes settings such as who can join, view membership, post mess…☆79Updated 7 months ago
- Drill into WARC web archives☆140Updated last year
- Make your programs stealthier🐝☆197Updated 6 months ago
- Fingerprint-aware TLS reverse proxy. Use Finch to outsmart bad traffic—collect client fingerprints (JA3, JA4 +QUIC, JA4H, HTTP/2) and act…☆284Updated last month
- GitHub Actions Cache Native Malware - for Educational and Research Purposes only.☆76Updated 3 weeks ago
- A Golang package for scanning private and public IPs for open TCP ports 👁️☆117Updated 9 months ago
- Ebyte-Go-Morpher is a Go program that parses, analyzes, and rewrites Go source code to apply multiple layers of obfuscation. It operates …☆120Updated 5 months ago
- Fragtunnel is a proof-of-concept (PoC) TCP tunnel tool that you can use to tunnel your application's traffic and bypass next-generation f…☆221Updated last year
- PWN is an open security automation framework that aims to stand on the shoulders of security giants, promoting trust and innovation.☆67Updated last week
- PyCript Websocket is now merge into https://github.com/Anof-cyber/PyCript, this repo is not available anymore.☆83Updated last week
- A tool designed for smuggling interactive command and control traffic through legitimate TURN servers hosted by reputable providers such …☆373Updated 4 months ago
- ☆40Updated last month
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆84Updated last year
- Tail Certificate Transparency logs and extract hostnames☆126Updated 6 months ago
- 🌐 Visualize and explore IaC ✒️ Create and share notes in VS Code 🤝 Sync notes and findings in real-time with friends☆73Updated last year
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services …☆103Updated 8 months ago
- Burp Suite extension for testing Passkey systems.☆75Updated 9 months ago
- Unauthenticated enumeration of AWS IAM Roles.☆26Updated 4 months ago