puppycodes / evil-chrome-extensionLinks
an evil chrome extension that steals credentials from form inputs
☆27Updated 5 years ago
Alternatives and similar repositories for evil-chrome-extension
Users that are interested in evil-chrome-extension are comparing it to the libraries listed below
Sorting:
- keylogger + cryptojacking extension chrome and mozilla ,basic malware browser Keylogger capture credentials,IP ,and send inormations to a…☆33Updated 5 years ago
- pour plus de tutos veuillez visiter le site☆11Updated 5 years ago
- pinky - The PHP mini RAT (Remote Administration Tool)☆77Updated 7 years ago
- Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devices☆22Updated 8 years ago
- pure python remote adb scanner + nmap scan module☆21Updated 6 years ago
- keylogger extension chrome, get cookie, redirection to fake web site or a nother website☆14Updated 5 years ago
- first program python to steal password microsoft edge all version browser, send info to email☆13Updated 4 years ago
- ☆20Updated 11 years ago
- ransomware encrypte all filles,disque C,disque D,Usb ...etc, filles can not be decrypted☆17Updated 6 years ago
- Agent Tesla Spyware C2 Exploit [PATCHED]☆31Updated 7 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits key☆30Updated 6 years ago
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆23Updated 7 years ago
- Samsung TV Denial of Service (DoS) Attack☆37Updated 8 years ago
- pentest toolbox☆28Updated 3 years ago
- facebook bot ,like comment,download phone number, download email adress, delect all friends ...........etc☆20Updated 6 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- Note:- Run this Script in root user.☆16Updated 7 years ago
- web information gathering / Grab links☆43Updated 5 years ago
- javascript phishing professionel ;redirect victim if he wants to login one paypal or another web site☆11Updated 4 years ago
- Framework for obtaining all the credentials stored in vulnerable Netwave IP cameras. Can be used to break into IP cameras, use for resear…☆37Updated 5 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆28Updated 2 months ago
- ☆22Updated 5 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Updated 2 months ago
- Perl IRC Bot for scanning and exploiting VNC servers on several ports using Mojo::IRC module.☆14Updated 3 years ago
- Social Toolkit for Phishing Attacks (Cross-Plataform)☆20Updated 8 years ago
- Launch a Windows EXE file with this EXE file (application filter evasion)☆13Updated 8 years ago
- A simple and cross-platform Remote Administration Tool written in Ruby☆16Updated 8 years ago
- Small backdoor using cookie.☆63Updated 8 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆57Updated 7 years ago
- pen testing scripts☆12Updated 4 years ago