noperator / chromedbLinks
Read Chromium data (namely, cookies and local storage) straight from disk, without spinning up the browser.
☆128Updated 4 months ago
Alternatives and similar repositories for chromedb
Users that are interested in chromedb are comparing it to the libraries listed below
Sorting:
- Protection against HTML smuggling attacks.☆97Updated 2 months ago
- Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephe…☆232Updated 2 months ago
- A fork of the Go language with some tweaks☆53Updated 7 months ago
- Hijack a slack bot to phish your way in☆56Updated last month
- Putting a leash on naughty AWS permissions☆130Updated last week
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40Updated 2 years ago
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆57Updated 2 months ago
- A tool designed for smuggling interactive command and control traffic through legitimate TURN servers hosted by reputable providers such …☆291Updated 3 weeks ago
- gubble is a tool designed to audit Google Workspace group settings. It analyzes settings such as who can join, view membership, post mess…☆79Updated 3 months ago
- Canary Detection☆187Updated 3 months ago
- GitHub Actions Cache Native Malware - for Educational and Research Purposes only.☆68Updated this week
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆101Updated 3 months ago
- Make your programs stealthier🐝☆180Updated 3 months ago
- Find what egress ports are allowed☆42Updated 2 years ago
- Burp Suite extension for testing Passkey systems.☆74Updated 5 months ago
- Secret Scanner for Slack, Jira, Confluence, Asana, Wrike, Linear, Zendesk, GitHub, and GitLab☆67Updated 3 months ago
- A Completely Modular LLM Reverse Engineering, Red Teaming, and Vulnerability Research Framework.☆50Updated 10 months ago
- A next-generation HTTP stealth proxy which perfectly cloaks requests as the Chrome browser across all layers of the stack.☆240Updated last week
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55Updated 4 months ago
- Ebyte-Go-Morpher is a Go program that parses, analyzes, and rewrites Go source code to apply multiple layers of obfuscation. It operates …☆117Updated last month
- Eve is a JAMF exploitation toolkit used to interact with locally hosted JAMF servers and those hosted on jamfcloud.com.☆31Updated last month
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆106Updated last month
- Fragtunnel is a proof-of-concept (PoC) TCP tunnel tool that you can use to tunnel your application's traffic and bypass next-generation f…☆211Updated last year
- CaptainCredz is a modular and discreet password-spraying tool.☆131Updated last month
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆66Updated last week
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆87Updated 6 months ago
- Gain another host's network access permissions by establishing a stateful connection with a spoofed source IP☆81Updated 3 months ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Updated last year
- Modular web-application honeypot platform built using go and gin☆60Updated last year
- ☆33Updated 4 months ago