Read Chromium data (namely, cookies and local storage) straight from disk, without spinning up the browser.
☆138May 7, 2025Updated 11 months ago
Alternatives and similar repositories for chromedb
Users that are interested in chromedb are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A simple mitmproxy blueprint to intercept HTTPS traffic from app running on Kubernetes☆76Apr 14, 2025Updated last year
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆38Sep 25, 2024Updated last year
- Steganography Tool for JPG Images☆65Apr 24, 2026Updated last week
- Identify hardcoded secrets in static structured text (version 2)☆98Feb 5, 2025Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆292May 16, 2025Updated 11 months ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆56Jun 30, 2021Updated 4 years ago
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆193Apr 14, 2024Updated 2 years ago
- 🌒 Shell command obfuscation to avoid detection systems☆122Oct 10, 2022Updated 3 years ago
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆61Jul 13, 2025Updated 9 months ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Dec 12, 2023Updated 2 years ago
- RedFlag uses AI to identify high-risk code changes. Run it in batch mode for release candidate testing or in CI pipelines to flag PRs and…☆163Nov 21, 2024Updated last year
- ☆84May 19, 2024Updated last year
- A Terraform module that makes it a snap to opt out of all AWS AI/ML data harvesting.☆30Jan 2, 2024Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 9 months ago
- Protect against subdomain takeover☆95Updated this week
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- Java archive implant toolkit.☆61Apr 20, 2025Updated last year
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆21Feb 8, 2024Updated 2 years ago
- A simple touchID prompt'er for use in shell scripts.☆99Jun 18, 2024Updated last year
- Reaping treasures from strings in remote processes memory☆286Feb 8, 2025Updated last year
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆35Apr 13, 2026Updated 2 weeks ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆151Feb 10, 2025Updated last year
- ☆30May 12, 2025Updated 11 months ago
- Proof-of-concept modular implant platform leveraging v8☆55Mar 4, 2025Updated last year
- FlowAnalyzer is a tool to help in testing and analyzing OAuth 2.0 Flows, including OpenID Connect (OIDC).☆182Jul 8, 2024Updated last year
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55May 7, 2025Updated 11 months ago
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Sep 15, 2023Updated 2 years ago
- ☆107Jan 4, 2023Updated 3 years ago
- Addon for BHCE☆57Apr 1, 2025Updated last year
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆106Nov 24, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Persist like a Dodder☆68May 19, 2025Updated 11 months ago
- moniorg is a tool that leverages crt.sh website to monitor domains of a target☆47Apr 1, 2023Updated 3 years ago
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆122Apr 25, 2026Updated last week
- Click Once + App Domain☆67Feb 23, 2026Updated 2 months ago
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrency☆16Apr 8, 2026Updated 3 weeks ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆87Apr 7, 2026Updated 3 weeks ago
- A C++ tool for process memory scanning & suspicious telemetry generation that attempts to detect a number of malicious techniques used by…☆88May 13, 2024Updated last year