☆1,042Dec 14, 2025Updated 3 months ago
Alternatives and similar repositories for decrypt-chrome-passwords
Users that are interested in decrypt-chrome-passwords are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Manifest V3 web extension for dynamic user specified actions☆15Dec 11, 2023Updated 2 years ago
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,436Jan 19, 2025Updated last year
- ☆153Jun 8, 2025Updated 10 months ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆37Jun 15, 2023Updated 2 years ago
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆392Jan 20, 2026Updated 2 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Extract and decrypt browser data, supporting multiple data types, runnable on various operating systems (macOS, Windows, Linux).☆13,655Updated this week
- Light-weight web security scanner☆149Nov 22, 2025Updated 4 months ago
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- ChromeStealer is a tool for educational purposes to demonstrate how to extract and decrypt stored passwords from Google Chrome on a Windo…☆188Jul 25, 2024Updated last year
- ☆146Mar 28, 2026Updated last week
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality…☆4,367May 21, 2025Updated 10 months ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆22Jun 11, 2022Updated 3 years ago
- A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell scripts to achieve AV evasion, compil…☆1,166Jul 19, 2024Updated last year
- Block any extension or website from accessing network☆43Sep 25, 2023Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A web service to clean documents from potentially privacy-invasive metadata☆50Apr 29, 2025Updated 11 months ago
- Simple Windows and Linux keystroke injection tool that exfiltrates stored WiFi data (SSID and password).☆568Jul 26, 2025Updated 8 months ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆117Jul 18, 2023Updated 2 years ago
- Browser Chrome extensions, to help with OSINT, OPSEC, Privacy & Obfuscation.☆410Nov 9, 2025Updated 5 months ago
- Duplicate not owned Token from Running Process☆73Jul 21, 2023Updated 2 years ago
- An updated version of keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard in…☆105Jul 27, 2023Updated 2 years ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,198Oct 16, 2023Updated 2 years ago
- game of active directory☆7,669Mar 12, 2026Updated 3 weeks ago
- This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structur…☆8,818Mar 25, 2026Updated 2 weeks ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- The Network Execution Tool☆5,393Apr 3, 2026Updated last week
- Open-source tool to bypass windows and linux passwords from bootable usb☆1,973Nov 10, 2023Updated 2 years ago
- Memory Scaner☆65Sep 9, 2022Updated 3 years ago
- The ultimate WinRM shell for hacking/pentesting☆5,325Mar 10, 2026Updated last month
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆609Jul 22, 2022Updated 3 years ago
- Tools and Techniques for Red Team / Penetration Testing☆8,617Mar 18, 2025Updated last year
- Native C++ access to Active Directory over ADWS, no .NET, no WCF, no HTTP stack.☆61Mar 27, 2026Updated 2 weeks ago
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,430Updated this week
- The recursive internet scanner for hackers. 🧡☆9,583Updated this week
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is de…☆819Mar 6, 2026Updated last month
- Send phishing messages and attachments to Microsoft Teams users☆1,113Jun 19, 2024Updated last year
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆35Mar 28, 2023Updated 3 years ago
- This repository contain a CheatSheet for OSWP & WiFi Cracking.☆341Jul 13, 2022Updated 3 years ago
- Bypass Chromium's App-Bound Encryption via Direct Syscall-based Reflective Process Hollowing. Extract cookies, passwords, payment methods…☆1,495Feb 9, 2026Updated 2 months ago
- A keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard input hook, allowing i…☆398Aug 2, 2023Updated 2 years ago
- Documents Exfiltration project for fun and educational purposes☆144Oct 10, 2023Updated 2 years ago