puppycodes / evil-chrome-extensionView external linksLinks
an evil chrome extension that steals credentials from form inputs
☆27Aug 5, 2020Updated 5 years ago
Alternatives and similar repositories for evil-chrome-extension
Users that are interested in evil-chrome-extension are comparing it to the libraries listed below
Sorting:
- javascript botnet browser V3 based one Cloud 9 Botnet and my botnet browser chrome. capture any web site,virtual clavier ,paypal,facebook…☆10Sep 12, 2020Updated 5 years ago
- keylogger sends the login details by email, card number, facebook account,paypal...etc new projet 2020☆17Sep 21, 2020Updated 5 years ago
- javascript phishing professionel ;redirect victim if he wants to login one paypal or another web site☆11Nov 5, 2020Updated 5 years ago
- A Chrome extension to steal your passwords☆21Mar 20, 2021Updated 4 years ago
- pour plus de tutos veuillez visiter le site☆11Sep 21, 2020Updated 5 years ago
- keylogger + cryptojacking extension chrome and mozilla ,basic malware browser Keylogger capture credentials,IP ,and send inormations to a…☆33Sep 21, 2020Updated 5 years ago
- keylogger extension chrome, get cookie, redirection to fake web site or a nother website☆15Sep 21, 2020Updated 5 years ago
- ransomware encrypte all filles,disque C,disque D,Usb ...etc, filles can not be decrypted☆17Nov 18, 2018Updated 7 years ago
- first program python to steal password microsoft edge all version browser, send info to email☆13Feb 11, 2021Updated 5 years ago
- Generate a ms batch file and inject a files inside of it. When the batch is executed, the files are extracted and executed.☆21Oct 19, 2019Updated 6 years ago
- Simple remote administration tool. Written in c++ and MASM.☆18May 16, 2018Updated 7 years ago
- A simple KeyLogger written in Plain JavaScript. Send data to PHP server.☆21Aug 25, 2018Updated 7 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Dec 12, 2019Updated 6 years ago
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆23Jun 15, 2020Updated 5 years ago
- ☆40Apr 23, 2018Updated 7 years ago
- post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass, PayloadEncryption etc..☆14Aug 31, 2017Updated 8 years ago
- CLI Chrome Extension (CRX) Packer written in Python☆16Nov 2, 2013Updated 12 years ago
- ATM security list☆12Aug 10, 2020Updated 5 years ago
- A cross-platform one-liner to steal a user's cookies from Chrome <- cool☆87Nov 21, 2018Updated 7 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- ☆24Feb 21, 2016Updated 9 years ago
- An advanced Windows Keylogger with features like (Disable CMD, Screenshotter, Client Stub Builder, Low Level Keyhooks, Hide Application, …☆32Oct 12, 2017Updated 8 years ago
- Pdf File : Exfiltration and Uploading DATA by DNS Traffic (AAAA Records)☆10Jun 7, 2023Updated 2 years ago
- Moovbox Mismanagement Utilities☆15Mar 21, 2015Updated 10 years ago
- A RAT, script that controls other pcs remotly, for educational purposes only☆13Jun 18, 2024Updated last year
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- Convert .bat files to .vbs☆14Aug 15, 2023Updated 2 years ago
- Rasta's mouse AMSI patch but with function that makes it undetectable.☆14Apr 21, 2021Updated 4 years ago
- ☆20Oct 14, 2013Updated 12 years ago
- Windows Privilege Escalation (Modified RottePotato)☆13Jun 5, 2018Updated 7 years ago
- Program to anonymize spam texts, to targets, or target lists☆14Sep 2, 2018Updated 7 years ago
- Windows inject☆16Jun 7, 2018Updated 7 years ago
- Bypass UAC by abusing shell protocol handlers☆14Jul 12, 2021Updated 4 years ago
- Download and loader .NET payload☆36Oct 8, 2019Updated 6 years ago
- ☆16Dec 13, 2022Updated 3 years ago
- XSS payload designed to steal LastPass users' credentials☆16Apr 25, 2014Updated 11 years ago
- steal cookie for chrome and mozilla firefox, use another extension to login with the cookie stealed☆32Mar 25, 2021Updated 4 years ago
- The project uses popular anti-virus protection bypass techniques☆12Nov 26, 2018Updated 7 years ago
- ☆20Jul 27, 2020Updated 5 years ago