Get unencrypted 'Saved Password' from Google Chrome
☆739Oct 15, 2023Updated 2 years ago
Alternatives and similar repositories for chrome_password_grabber
Users that are interested in chrome_password_grabber are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python steal chrome password all version browser are supported 100 % FUD☆281Feb 16, 2021Updated 5 years ago
- Chromepass - Hacking Chrome Saved Passwords☆827Dec 27, 2023Updated 2 years ago
- Automated sticky keys hack. Post exploitation it grabs browser passwords, history, and network passwords☆13Jul 17, 2016Updated 9 years ago
- Exploit code for CVE-2019-11707 on Firefox 66.0.3 running on Ubuntu☆42Aug 18, 2019Updated 6 years ago
- Windows 10 UAC bypass for all executable files which are autoelevate true .☆641Dec 9, 2019Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆69Dec 10, 2022Updated 3 years ago
- Crypter in Python 3 with advanced functionality, Bypass VM, Encrypt Source with AES & Base64 Encoding | Evil Code is executed by brutefor…☆350Apr 20, 2022Updated 4 years ago
- PowerShell ReverseTCP Shell - Framework☆1,064Sep 18, 2022Updated 3 years ago
- Sharp Wifi Password Grabber retrieves in clear-text the Wi-Fi Passwords from all WLAN Profiles saved on a workstation.☆104Dec 12, 2020Updated 5 years ago
- Everything related to Cobalt Strike☆15Feb 3, 2020Updated 6 years ago
- (THIS CODE IS OUTDATED FOR NEW CHROME VERSIONS) Decrypt chromium based browsers passwords, cookies, credit cards, history, bookmarks, au…☆818Jan 12, 2025Updated last year
- Python AV Evasion Tools☆518Oct 14, 2025Updated 6 months ago
- RCE on Apache Solr using deserialization of untrusted data via jmx.serviceUrl☆210Mar 10, 2019Updated 7 years ago
- An AntSword's plugin to scan webshell☆16Sep 2, 2019Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- 蚁剑其他脚本AES编/解码器☆36Aug 28, 2019Updated 6 years ago
- Obfuscate powershell scripts by replacing Function names, Variables and Parameters.☆523Nov 26, 2022Updated 3 years ago
- ☆14Sep 22, 2019Updated 6 years ago
- Chrome Password Decryptor - Recover locally saved accounts on Chrome (v80 and older versions) and other Chromium based browsers☆60Mar 11, 2020Updated 6 years ago
- UAC bypass, Elevate, Persistence methods☆2,745Feb 13, 2023Updated 3 years ago
- This project is a cross-platform backdoor/reverse shell and post-exploitation tool written in Python3☆755Aug 13, 2024Updated last year
- Golang tool to scan hosts for SMB version and signing status☆15Nov 19, 2024Updated last year
- ☆13Nov 22, 2022Updated 3 years ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆1,443Jul 20, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Open-Source Remote Administration Tool for Windows. 100% FUD Without any Crypter☆175Dec 8, 2022Updated 3 years ago
- When you request Google Chrome to save your password on a given website, it stores it in a sqlite database file. In order to securely sto…☆83Oct 3, 2020Updated 5 years ago
- ☆1,048Dec 14, 2025Updated 4 months ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆945May 8, 2019Updated 6 years ago
- gather gather gather☆586Mar 15, 2025Updated last year
- A tool which creates a spoofed certificate of any online website and signs an Executable for AV Evasion. Works for both Windows and Linux☆1,416Oct 3, 2020Updated 5 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Jul 9, 2019Updated 6 years ago
- Post-exploitation NTLM password hash extractor☆19Apr 7, 2021Updated 5 years ago
- Bug Bounty Clipboard☆17Nov 6, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- RedPeanut is a small RAT developed in .Net Core 2 and its agent in .Net 3.5 / 4.0.☆330Jul 7, 2023Updated 2 years ago
- A tool to create obfuscated HTA script.☆179Jul 2, 2021Updated 4 years ago
- FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.☆255May 1, 2023Updated 3 years ago
- Fake Windows logon screen to steal passwords☆1,374Feb 3, 2020Updated 6 years ago
- BlueKeep powershell scanner (based on c# code)☆39Nov 11, 2019Updated 6 years ago
- ParadoxiaRat : Native Windows Remote access Tool.☆823Apr 18, 2023Updated 3 years ago
- An evil RAT (Remote Administration Tool) for macOS / OS X.☆2,406Feb 10, 2021Updated 5 years ago