ohyicong / decrypt-chrome-passwordsView external linksLinks
☆1,027Dec 14, 2025Updated 2 months ago
Alternatives and similar repositories for decrypt-chrome-passwords
Users that are interested in decrypt-chrome-passwords are comparing it to the libraries listed below
Sorting:
- Firefox Decrypt is a tool to extract passwords from Mozilla (Firefox™, Waterfox™, Thunderbird®, SeaMonkey®) profiles☆2,379Jan 27, 2026Updated 2 weeks ago
- Manifest V3 web extension for dynamic user specified actions☆15Dec 11, 2023Updated 2 years ago
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,412Jan 19, 2025Updated last year
- ☆146Jun 8, 2025Updated 8 months ago
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆387Jan 20, 2026Updated 3 weeks ago
- ChromeStealer is a tool for educational purposes to demonstrate how to extract and decrypt stored passwords from Google Chrome on a Windo…☆186Jul 25, 2024Updated last year
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- Light-weight web security scanner☆150Nov 22, 2025Updated 2 months ago
- Extract and decrypt browser data, supporting multiple data types, runnable on various operating systems (macOS, Windows, Linux).☆13,519Nov 27, 2025Updated 2 months ago
- Memory Scaner☆65Sep 9, 2022Updated 3 years ago
- Browser Chrome extensions, to help with OSINT, OPSEC, Privacy & Obfuscation.☆401Nov 9, 2025Updated 3 months ago
- ☆144Dec 6, 2025Updated 2 months ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆37Jun 15, 2023Updated 2 years ago
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality…☆4,331May 21, 2025Updated 8 months ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆117Jul 18, 2023Updated 2 years ago
- A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell scripts to achieve AV evasion, compil…☆1,136Jul 19, 2024Updated last year
- A web service to clean documents from potentially privacy-invasive metadata☆49Apr 29, 2025Updated 9 months ago
- Duplicate not owned Token from Running Process☆74Jul 21, 2023Updated 2 years ago
- Open-source tool to bypass windows and linux passwords from bootable usb☆1,965Nov 10, 2023Updated 2 years ago
- This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structur…☆8,640Jun 22, 2025Updated 7 months ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆22Jun 11, 2022Updated 3 years ago
- Tools and Techniques for Red Team / Penetration Testing☆8,477Mar 18, 2025Updated 10 months ago
- game of active directory☆7,437Jul 16, 2025Updated 6 months ago
- Simple Windows and Linux keystroke injection tool that exfiltrates stored WiFi data (SSID and password).☆550Jul 26, 2025Updated 6 months ago
- The Network Execution Tool☆5,250Updated this week
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,401Jan 19, 2026Updated 3 weeks ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆35Mar 28, 2023Updated 2 years ago
- Block any extension or website from accessing network☆44Sep 25, 2023Updated 2 years ago
- The ultimate WinRM shell for hacking/pentesting☆5,244Jan 9, 2026Updated last month
- ☆33Apr 23, 2023Updated 2 years ago
- PoC for a SMS-based shell. Send commands and receive responses over SMS from mobile broadband capable computers☆370May 22, 2023Updated 2 years ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,149Updated this week
- The recursive internet scanner for hackers. 🧡☆9,415Updated this week
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,199Oct 16, 2023Updated 2 years ago
- Distribución para OSINT basada en Debian 12 / OSINT Distribution based in Debian 12☆91May 18, 2025Updated 8 months ago
- Generates millions of keyword-based password mutations in seconds.☆1,407Jun 8, 2025Updated 8 months ago
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is de…☆817Feb 17, 2025Updated 11 months ago
- Ask a TGS on behalf of another user without password☆481Mar 30, 2025Updated 10 months ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆3,600Nov 14, 2025Updated 3 months ago