ohyicong / decrypt-chrome-passwordsLinks
☆1,000Updated last year
Alternatives and similar repositories for decrypt-chrome-passwords
Users that are interested in decrypt-chrome-passwords are comparing it to the libraries listed below
Sorting:
- Ready to go Phishing Platform☆1,062Updated 5 months ago
- Magnet Link for Downloading☆285Updated last year
- Generates millions of keyword-based password mutations in seconds.☆1,359Updated 4 months ago
- A small and efficent script to send SMS all over the world anonymously☆525Updated 3 weeks ago
- Get IP address on other side audio call in Telegram.☆1,806Updated last year
- This python program gets all the saved passwords, credit cards and bookmarks from chromium based browsers supports chromium 80 and above!☆433Updated last year
- Phishing with a fake reCAPTCHA☆611Updated last year
- Windows Remote Administration Tool that uses Discord, Telegram and GitHub as C2s☆657Updated last year
- Xeno-RAT is an open-source remote access tool (RAT) developed in C#, providing a comprehensive set of features for remote system manageme…☆1,389Updated last year
- Uncover the true IP address of websites safeguarded by Cloudflare & Others☆1,926Updated 5 months ago
- AutoPWN Suite is a project for scanning vulnerabilities and exploiting systems automatically.☆1,015Updated this week
- Simple Windows and Linux keystroke injection tool that exfiltrates stored WiFi data (SSID and password).☆530Updated 2 months ago
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,344Updated 8 months ago
- CVE-2023-38831 winrar exploit generator☆787Updated last year
- Microsoft-Outlook-Remote-Code-Execution-Vulnerability☆742Updated last year
- Codebase to generate an msdt-follina payload☆1,623Updated 3 years ago
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.☆757Updated 9 months ago
- Zehef is an osint tool to track emails☆934Updated 10 months ago
- Track the GPS location of the user's smartphone or PC and capture a picture of the target, along with IP and device information.☆1,140Updated 6 months ago
- It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography …☆410Updated 3 years ago
- All-in-One Toolkit for BruteForce Attacks☆895Updated last year
- 🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard…☆1,658Updated 5 months ago
- Matkap - hunt down malicious Telegram bots☆774Updated last month
- A collection of bookmarks for penetration testers, bug bounty hunters, malware developers, reverse engineers and anyone who is just inte…☆913Updated 2 years ago
- Chiasmodon is an OSINT tool designed to assist in the process of gathering information about a target domain. Its primary functionality …☆645Updated 5 months ago
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,163Updated this week
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality…☆4,249Updated 4 months ago
- A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell scripts to achieve AV evasion, compil…☆1,067Updated last year
- PoC to record audio from a Bluetooth device☆1,470Updated last year
- Remote persistent 🔑Logger for Windows and Linux☆296Updated 2 years ago