shaddy43 / BrowserSnatch
This project steals important data from all chromium and gecko browsers installed in the system and gather the data in a stealer db to be exfiltrated out. A powerful Browser Stealer
☆206Updated 2 weeks ago
Alternatives and similar repositories for BrowserSnatch:
Users that are interested in BrowserSnatch are comparing it to the libraries listed below
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆150Updated 9 months ago
- Extract and execute a PE embedded within a PNG file using an LNK file.☆355Updated 3 months ago
- ☆212Updated this week
- Reverse shell that can bypass windows defender detection☆161Updated last year
- yet another AV killer tool using BYOVD☆264Updated last year
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆171Updated 5 months ago
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆161Updated 11 months ago
- Proof of Concept (PoC) .NET tool for remotely killing EDR with WDAC☆334Updated last month
- PDF dropper Red Team Scenairos☆182Updated 6 months ago
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆143Updated 8 months ago
- Reproducing Spyboy technique, which involves terminating all EDR/XDR/AVs processes by abusing the zam64.sys driver☆257Updated 2 weeks ago
- Awesome AV/EDR/XDR Bypass Tips☆263Updated last year
- Nameless C2 - A C2 with all its components written in Rust☆260Updated 4 months ago
- Continuous password spraying tool☆128Updated last week
- Extract C2 Traffic☆248Updated 2 months ago
- Fully functional, from-scratch alternative to the Cobalt Strike Beacon (red teaming tool), offering transparency and flexibility for secu…☆201Updated 11 months ago
- C2 infrastructure that allows Red Teamers to execute system commands on compromised hosts through Microsoft Teams.☆364Updated last month
- ☆295Updated 2 months ago
- Python implementation of GhostPack's Seatbelt situational awareness tool☆241Updated 3 months ago
- 🐍 Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.☆158Updated last year
- Tool designed to find folder exclusions using Windows Defender using command line utility MpCmdRun.exe as a low privileged user, without …☆186Updated 4 months ago
- RDPCredentialStealer it's a malware that steal credentials provided by users in RDP using API Hooking with Detours in C++☆240Updated last year
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆251Updated 6 months ago
- Different methods to get current username without using whoami☆173Updated last year
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆327Updated 4 months ago
- ☆343Updated 2 months ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆159Updated last year
- AV bypass while you sip your Chai!☆217Updated 9 months ago
- An aggressor script that can help automate payload building in Cobalt Strike☆114Updated last year