☆1,048Dec 14, 2025Updated 4 months ago
Alternatives and similar repositories for decrypt-chrome-passwords
Users that are interested in decrypt-chrome-passwords are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Firefox Decrypt is a tool to extract passwords from Mozilla (Firefox™, Waterfox™, Thunderbird®, SeaMonkey®) profiles☆2,413Feb 23, 2026Updated 2 months ago
- Manifest V3 web extension for dynamic user specified actions☆15Dec 11, 2023Updated 2 years ago
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,451Jan 19, 2025Updated last year
- ☆153Jun 8, 2025Updated 10 months ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆37Jun 15, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆397Jan 20, 2026Updated 3 months ago
- Extract and decrypt browser data, supporting multiple data types, runnable on various operating systems (macOS, Windows, Linux).☆13,763Updated this week
- Light-weight web security scanner☆149Nov 22, 2025Updated 5 months ago
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- ChromeStealer is a tool for educational purposes to demonstrate how to extract and decrypt stored passwords from Google Chrome on a Windo…☆192Jul 25, 2024Updated last year
- ☆149Apr 22, 2026Updated 2 weeks ago
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality…☆4,375May 21, 2025Updated 11 months ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆22Jun 11, 2022Updated 3 years ago
- A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell scripts to achieve AV evasion, compil…☆1,171Jul 19, 2024Updated last year
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Block any extension or website from accessing network☆43Sep 25, 2023Updated 2 years ago
- A web service to clean documents from potentially privacy-invasive metadata☆50Apr 29, 2025Updated last year
- Simple Windows and Linux keystroke injection tool that exfiltrates stored WiFi data (SSID and password).☆570Jul 26, 2025Updated 9 months ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆118Jul 18, 2023Updated 2 years ago
- Browser Chrome extensions, to help with OSINT, OPSEC, Privacy & Obfuscation.☆410Updated this week
- game of active directory☆7,771Mar 12, 2026Updated last month
- Duplicate not owned Token from Running Process☆73Jul 21, 2023Updated 2 years ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,198Oct 16, 2023Updated 2 years ago
- An updated version of keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard in…☆105Jul 27, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structur…☆8,838Apr 29, 2026Updated last week
- Open-source tool to bypass windows and linux passwords from bootable usb☆1,973Nov 10, 2023Updated 2 years ago
- The Network Execution Tool☆5,487Apr 29, 2026Updated last week
- Memory Scaner☆65Sep 9, 2022Updated 3 years ago
- The ultimate WinRM shell for hacking/pentesting☆5,358Mar 10, 2026Updated last month
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆615Jul 22, 2022Updated 3 years ago
- Tools and Techniques for Red Team / Penetration Testing☆8,706Apr 18, 2026Updated 2 weeks ago
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,446Apr 9, 2026Updated 3 weeks ago
- Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)☆1,511Dec 21, 2025Updated 4 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- The recursive internet scanner for hackers. 🧡☆9,655Updated this week
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is de…☆821Apr 18, 2026Updated 2 weeks ago
- Send phishing messages and attachments to Microsoft Teams users☆1,112Jun 19, 2024Updated last year
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆35Mar 28, 2023Updated 3 years ago
- A keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard input hook, allowing i…☆398Aug 2, 2023Updated 2 years ago
- This repository contain a CheatSheet for OSWP & WiFi Cracking.☆343Jul 13, 2022Updated 3 years ago
- Documents Exfiltration project for fun and educational purposes☆144Oct 10, 2023Updated 2 years ago