shaddy43 / BrowserSnatch
This project steals important data from all chromium and gecko browsers installed in the system and gather the data in a stealer db to be exfiltrated out. A powerful Browser Stealer
☆182Updated this week
Related projects ⓘ
Alternatives and complementary repositories for BrowserSnatch
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆147Updated 6 months ago
- Reverse shell that can bypass windows defender detection☆155Updated 9 months ago
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆157Updated 2 months ago
- Different methods to get current username without using whoami☆172Updated 9 months ago
- Extract and execute a PE embedded within a PNG file using an LNK file.☆239Updated 3 weeks ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆143Updated 6 months ago
- Microsoft SharePoint Server Elevation of Privilege Vulnerability☆228Updated last year
- AV bypass while you sip your Chai!☆207Updated 6 months ago
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆106Updated last year
- AV/EDR Lab environment setup references to help in Malware development☆190Updated 3 weeks ago
- yet another AV killer tool using BYOVD☆263Updated 11 months ago
- Continuous password spraying tool☆117Updated this week
- A shellcode injection tool showcasing various process injection techniques☆134Updated 11 months ago
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆136Updated 5 months ago
- Nameless C2 - A C2 with all its components written in Rust☆242Updated last month
- Everything and anything related to password spraying☆126Updated 6 months ago
- An aggressor script that can help automate payload building in Cobalt Strike☆113Updated 10 months ago
- ☆213Updated 8 months ago
- C2 infrastructure that allows Red Teamers to execute system commands on compromised hosts through Microsoft Teams.☆159Updated last week
- Documents Exfiltration project for fun and educational purposes☆144Updated last year
- 🐍 Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.☆158Updated last year
- ☆267Updated last year
- Awesome AV/EDR/XDR Bypass Tips☆253Updated last year
- Leverage WindowsApp createdump tool to obtain an lsass dump☆142Updated 2 months ago
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆265Updated 2 weeks ago
- ☆163Updated last year
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆126Updated 6 months ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆162Updated last month