Zero dependency browser extension for handling import of cookies, Microsoft 365 OAuth tokens, and Graph API interactions.
☆25Mar 19, 2026Updated last month
Alternatives and similar repositories for session-sushi
Users that are interested in session-sushi are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The ADSyncDump BOF is a port of Dirk-Jan Mollema's adconnectdump.py / ADSyncDecrypt into a Beacon Object File (BOF) with zero dependencie…☆175Sep 3, 2025Updated 8 months ago
- Python based tool for generating Shellcode from PIC C☆43Nov 6, 2025Updated 6 months ago
- Commandline spoofing on Windows☆101Nov 25, 2025Updated 5 months ago
- Offensive toolkit and BloodHound graph creator for DPAPI blobs and master key files☆15Jan 10, 2026Updated 3 months ago
- Open Source Implementation of Cobalt Strike's Malleable C2☆98Jan 27, 2026Updated 3 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A powerful Windows UI monitoring and DNS exfiltration tool written in Rust, combining advanced UI event capture capabilities with secure …☆19Mar 6, 2025Updated last year
- Utilizng an MCP Server to communicate with your C2☆91May 15, 2025Updated 11 months ago
- Command-line tool for discovering SaaS platforms a company uses via DNS enumeration☆40Jul 23, 2025Updated 9 months ago
- ☆38Oct 16, 2025Updated 6 months ago
- A C# tool with more flexibility to customize scheduled task for both persistence and lateral movement in red team operation☆18Dec 18, 2024Updated last year
- Awesome MalDev Links☆62Apr 28, 2026Updated last week
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆35Apr 13, 2026Updated 3 weeks ago
- A small How-To on creating your own weaponized WSL file☆126Jul 23, 2025Updated 9 months ago
- Dump protected process memory by using BYOVD to tamper with handle objects in the kernel.☆41Aug 5, 2025Updated 9 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- This is the Git repository for the Modern Red Teaming workshop given at SINCON2024.☆13May 23, 2024Updated last year
- Dump Teams conversations☆18Jun 9, 2021Updated 4 years ago
- A multifunctional Android RAT with GUI based Web Panel without port forwarding.☆12Dec 18, 2022Updated 3 years ago
- This repo contains useful scripts that AI created for me which I would have been too lazy for☆95Mar 17, 2026Updated last month
- Locate dlls and function addresses without PEB Walk and EAT parsing☆105Nov 7, 2025Updated 6 months ago
- Thats it! An Open-Source Windows UEFI Rootkit☆29Jul 19, 2025Updated 9 months ago
- ☆26Dec 21, 2025Updated 4 months ago
- Proof-of-concept implementation of AI-enabled postex DLLs☆93Sep 10, 2025Updated 7 months ago
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆11Apr 2, 2022Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Weaponize signed .NET ClickOnce applications for initial access by hijacking a dependency DLL via AppDomainManager injection and loading …☆160Feb 14, 2026Updated 2 months ago
- ALL IN ONE Hacking Tool For Hackers☆11Dec 12, 2020Updated 5 years ago
- Situational Awareness script to identify how and where to run implants☆68Dec 6, 2024Updated last year
- (MeetC2 a.k.a Meeting C2) - A framework abusing Google Calendar APIs.☆139Apr 6, 2026Updated last month
- OrFinder is a tool which scan the internet to find open relay SMTPs☆15Aug 7, 2017Updated 8 years ago
- Evasion kit for Cobalt Strike☆30Jan 16, 2026Updated 3 months ago
- ☆40Feb 27, 2026Updated 2 months ago
- Erebus is an Initial Access wrapper for the Mythic Command & Control Server. It converts existing Mythic shellcode into payloads specific…☆132May 1, 2026Updated last week
- BOF POC of the DSCourier project / invoking WinGet via COM☆80Apr 23, 2026Updated 2 weeks ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Power Automate C2 (PAC2) : Stealth living-off-the-cloud C2 framework.☆37Apr 16, 2024Updated 2 years ago
- Hooking KPRCB IdlePreselect function to gain execution inside PID 0.☆74Apr 13, 2025Updated last year
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Apr 14, 2025Updated last year
- Blog/Journal on how to backdoor VSCode extensions☆79Feb 24, 2026Updated 2 months ago
- PoC framework for Sliver compilation☆22Jan 14, 2025Updated last year
- An HTA Application which builds Azure (Entra) Scenarios for Red Team Simulations☆63Aug 18, 2025Updated 8 months ago
- Phunter is an osint tool allowing you to find various information via a phone number 🔎📞☆14Apr 7, 2024Updated 2 years ago