thewh1teagle / chrome-privless-encryption
A PoC demonstrating how to bypass Chrome v20+ appbound encryption to extract HTTP-only and secure cookies using Chrome's Remote Debugging Protocol, without admin rights.
☆23Updated 2 months ago
Alternatives and similar repositories for chrome-privless-encryption:
Users that are interested in chrome-privless-encryption are comparing it to the libraries listed below
- Chrome COOKIE v20 decryption PoC☆57Updated 3 months ago
- golang decryption poc of the new app bound encryption introduced in chrome version 127.☆19Updated 2 months ago
- A nice process dumping tool☆78Updated 2 years ago
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆80Updated 2 years ago
- Remotely Enumerate sessions using undocumented Windows Station APIs☆111Updated 5 months ago
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆42Updated 10 months ago
- A simple Sleepmask BOF example☆81Updated 4 months ago
- A basic C2 framework written in C☆58Updated 6 months ago
- This repo goes with the blog entry at blog.malicious.group entitled "Writing your own RDI / sRDI loader using C and ASM".☆75Updated last year
- extract chromium-based browser's cookies using chrome's remote debugging without admin rights☆21Updated 2 months ago
- A POC to disable TamperProtection and other Defender / MDE components☆195Updated 7 months ago
- User Mode Windows Rootkit☆55Updated last year
- Indirect NT syscalls LSASS dumper.☆40Updated last year
- LKM rootkit for modern kernels, with DNS C2 and a simple web interface☆63Updated last week
- Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks☆77Updated last month
- Shellcode loader☆75Updated 2 months ago
- WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler☆119Updated 2 months ago
- A fucking real shellcode loader with a GUI. Work-in-Progress.☆67Updated 2 weeks ago
- XOR decrypting shellcode using the GPU with OpenCL.☆92Updated last year
- Windows C++ Implant for Exploration C2☆23Updated this week
- Stealthily inject shellcode into an executable☆139Updated this week
- Evasive loader to bypass static detection☆56Updated last year
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.☆60Updated last year
- A vulnerable driver exploited by me (BYOVD) that is capable of terminating several EDRs and antivirus software in the market, rendering t…☆92Updated last month
- Loading Fileless Remote PE from URI to memory with argument passing and ETW patching and NTDLL unhooking and No New Thread technique☆61Updated 2 years ago
- Simple POC library to execute arbitrary calls proxying them via NdrServerCall2 or similar☆125Updated 5 months ago
- Execute shellcode files with rundll32☆191Updated last year
- Simple ETW unhook PoC. Overwrites NtTraceEvent opcode to disable ETW at Nt-function level.☆43Updated 11 months ago
- bring your own vulnerable driver☆90Updated last year
- ☆146Updated last year