puppycodes / evil-chrome-extension
an evil chrome extension that steals credentials from form inputs
☆25Updated 4 years ago
Alternatives and similar repositories for evil-chrome-extension:
Users that are interested in evil-chrome-extension are comparing it to the libraries listed below
- pure python remote adb scanner + nmap scan module☆21Updated 6 years ago
- An analysis on cryptocurrency mining malware embedded via JavaScript.☆13Updated 7 years ago
- iSpy Keylogger☆42Updated 8 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits key☆28Updated 6 years ago
- All Zero Day Exploits☆19Updated 7 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- ~ ADMIN Panel Finder By Ⓜ Ⓐ Ⓝ Ⓘ Ⓢ Ⓢ Ⓞ ☪ ~☆21Updated 8 years ago
- web information gathering / Grab links☆42Updated 5 years ago
- Google Hack Database dork automatic tool.☆24Updated 7 years ago
- Exploiting Android Devices Running Insecure Remote ADB Service☆20Updated 6 years ago
- Spider or repeater to find all links.☆13Updated 4 years ago
- ransomware chiffre tous les fichiers,télécharge une image depuis un serveur distant puis change le fond d'ecran après le chiffrement des …☆25Updated 4 years ago
- Vulnerability Scanner☆11Updated 10 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆24Updated 6 years ago
- ☆20Updated 11 years ago
- pentest toolbox☆28Updated 2 years ago
- [BASH] Password generator through a wordlist☆12Updated 12 years ago
- Capstone: Keylogger Trojan☆35Updated 6 years ago
- Virus RAT v8.0 Beta☆22Updated 8 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- ransomware encrypte all filles,disque C,disque D,Usb ...etc, filles can not be decrypted☆17Updated 6 years ago
- simple javascript keylogger google chrome☆8Updated 4 years ago
- Repository of tools used in my blog☆51Updated last year
- transform your payload.exe into one fake word doc (.ppt)☆8Updated last year
- A python3 script that uses cl1p website to send and receive secret messages☆28Updated 4 years ago
- Launch a Windows EXE file with this EXE file (application filter evasion)☆13Updated 8 years ago
- Automated Google dorking with custom search engines☆27Updated 4 years ago
- SkyRAT - Powershell Remote Administration Tool☆32Updated 7 years ago
- Perl IRC Bot for scanning and exploiting VNC servers on several ports using Mojo::IRC module.☆13Updated 3 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago