Decryptor for Chrome login data. Supports older Chrome versions (below 80) and (>80)
☆10Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for ChromeDecryptor
Users that are interested in ChromeDecryptor are comparing it to the libraries listed below
Sorting:
- ✔A script that turns off Windows Defender☆23May 21, 2022Updated 3 years ago
- Bypass Xiaomi RSA 256 EDL Auth☆13Sep 2, 2025Updated 6 months ago
- ip-keyloger☆10Jan 9, 2026Updated last month
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆13Dec 20, 2022Updated 3 years ago
- All my PowerShell Code☆14May 22, 2025Updated 9 months ago
- PowerShell tool to enumerate existing exclusions in Windows Defender as low privileged user☆11Oct 14, 2024Updated last year
- GUI Tool to Generate Android Payloads.☆10May 20, 2020Updated 5 years ago
- Simple Bot untuk Flash Sale Shoopee☆15Dec 11, 2020Updated 5 years ago
- Simple RFCOMM Server/Client implementation using the BlueCove Java library.☆12Apr 23, 2017Updated 8 years ago
- A Python backdoor for spying on Windows machines☆10Apr 21, 2022Updated 3 years ago
- Plunge into the depths of the web with Linkscraper! Uncover links, images, emails, and more swiftly, catering to researchers, developers,…☆11Nov 9, 2024Updated last year
- Ransomware programado en Python☆10Oct 8, 2020Updated 5 years ago
- Python Reverse Shell Builder with some advanced functionalities☆10Feb 16, 2021Updated 5 years ago
- Spider or repeater to find all links.☆10Feb 7, 2021Updated 5 years ago
- ☆10Jan 24, 2023Updated 3 years ago
- Modded version of KoiVM☆12Aug 17, 2019Updated 6 years ago
- Lenovo BootLoader Unlock Tool☆16Jun 15, 2025Updated 8 months ago
- secret website very interesting☆10Apr 24, 2022Updated 3 years ago
- A hacking panel based in Kali tools and more! Only with educational porpuses. The author is not responsable for any damage☆11Feb 7, 2022Updated 4 years ago
- 리눅스 마스터 자격증 중요 개념 정리본 - 메인테이너: 유진승☆11Apr 18, 2025Updated 10 months ago
- A Tool for Impersonating CAPTCHA Providers☆16Aug 3, 2012Updated 13 years ago
- Copy and paste text across LAN devices☆11Jul 3, 2017Updated 8 years ago
- ☆10Apr 21, 2022Updated 3 years ago
- ☆15Aug 12, 2024Updated last year
- Materials for CVE-2024-30052.☆12Oct 4, 2024Updated last year
- Numbers in Your Documents can reveal your personal informations. This tool is an OSINT tool to gather informations from CC, BIN code, MIC…☆13Jan 31, 2021Updated 5 years ago
- ☆10May 22, 2022Updated 3 years ago
- A Portable Executable (PE) Format poster in A1 59,4 x 84,1 cm format, including almost all of the structures from PE/PE32+ format (with c…☆20Mar 11, 2023Updated 2 years ago
- CinetPay Seamless Integration permet d'integrer facilement CinetPay de façon transparente à son service☆11Dec 19, 2019Updated 6 years ago
- ☆10Feb 24, 2022Updated 4 years ago
- Tiny read-only unlocker for MS Office documents☆12Aug 18, 2021Updated 4 years ago
- Process injection via KernelCallbackTable☆13Jan 28, 2022Updated 4 years ago
- Replaces the tokens in your C/C++ project with oofs that decrease readability☆10Oct 27, 2020Updated 5 years ago
- Proxy Grabber using ProxyScrape API.☆12Sep 25, 2022Updated 3 years ago
- A program to steal user information through a simple link☆15May 19, 2023Updated 2 years ago
- Peap Bomb is a password sprayer for WPA/WPA2 enterprise wireless that is leveraging PEAP for Authentication.☆10Feb 18, 2021Updated 5 years ago
- Locate device location using Social engineering☆18Sep 30, 2022Updated 3 years ago
- Fake Update Website ( On Click Automatic Download Windows Payload )☆11Apr 8, 2020Updated 5 years ago
- Keylogger that sends Email at a specific time☆10Apr 7, 2018Updated 7 years ago