USB / CD / DVD autorun password stealer
☆284Oct 27, 2019Updated 6 years ago
Alternatives and similar repositories for PasswordStealer
Users that are interested in PasswordStealer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Steal chrome passwords using usb rubber ducky☆19Apr 23, 2014Updated 11 years ago
- Fake Windows logon screen to steal passwords☆1,373Feb 3, 2020Updated 6 years ago
- Crappy cookie stealer☆109Nov 15, 2020Updated 5 years ago
- A USB RUBBER DUCKY GUI! A RoR app as a simple GUI wrapper for the Duck Encoder. Have it configured to serve remotely and you have a way o…☆30Dec 11, 2014Updated 11 years ago
- Info and password stealer☆112Feb 25, 2017Updated 9 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Create custom Autorun.inf for removable media☆13Apr 8, 2019Updated 7 years ago
- Crypter For Malware and Stealer☆33Apr 10, 2020Updated 6 years ago
- Python steal chrome password all version browser are supported 100 % FUD☆280Feb 16, 2021Updated 5 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- HackRF / RTLSDR Spectrum Scanning Interface (WIP)☆29Aug 18, 2016Updated 9 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆39Feb 21, 2016Updated 10 years ago
- Disclaimer :- I am not promoting any illegal activity here . this is purely for educational purpose . i am not responsible if you use it …☆53Nov 23, 2022Updated 3 years ago
- POC Bitcoin stealer☆98May 4, 2018Updated 7 years ago
- Arduino based device for reading Mifare cards from a distance using RC522 module and an OLED display for portable reading of card data.☆20Nov 21, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Script to steal passwords from ssh.☆489Dec 19, 2018Updated 7 years ago
- Find subfolders in the Windows folder which have bad ACL and allow write and execute☆14Oct 20, 2015Updated 10 years ago
- A solution for scanning NFC Cards and extracting the string extras. Useful for android POS terminals, tap to pay meters, tap to connect s…☆28Sep 5, 2020Updated 5 years ago
- Simple PowerShell enumeration script to look for interesting files☆10Aug 26, 2019Updated 6 years ago
- A Tools Session Hijacking And Stealer Local Passcode Telegram Windows☆448Jun 28, 2023Updated 2 years ago
- Wi-Fi Password Stealer☆66Oct 3, 2024Updated last year
- T.U.F.F. - Targeted Utility for Fast Forensics is mainly used to recon websites and IP addresses for vulnerabilities for an easier pentes…☆11May 26, 2023Updated 2 years ago
- (Unstable*) Copy System Info, Browser Passwords, WiFi Keys & Much More To USB, Automatically !!! (Only For Legal Purposes)☆40Jan 19, 2018Updated 8 years ago
- Turn a normal PDF file into malicious.Use to steal Net-NTLM Hashes from windows machines.☆345Apr 17, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- TeleShadow - Telegram Desktop Session Stealer (Windows)☆118Jun 28, 2018Updated 7 years ago
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆23Jun 15, 2020Updated 5 years ago
- Passwords Recovery Tool☆232Feb 3, 2021Updated 5 years ago
- When you request Google Chrome to save your password on a given website, it stores it in a sqlite database file. In order to securely sto…☆83Oct 3, 2020Updated 5 years ago
- ☆16Feb 26, 2018Updated 8 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆62Oct 11, 2015Updated 10 years ago
- Enumerate subdomains through Virustotal☆32Nov 2, 2019Updated 6 years ago
- some python3 functions to add spreading features to any python backdoor☆56Jan 22, 2017Updated 9 years ago
- vulnerability that allows unauthorized control of an IP camera using the ONVIF protocol, The provided proof-of-concept code is capable c…☆13Apr 13, 2025Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆61May 11, 2015Updated 10 years ago
- ☆16Oct 23, 2015Updated 10 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,458Nov 3, 2018Updated 7 years ago
- This repository contains some details about abusing outlook.☆27Aug 17, 2018Updated 7 years ago
- browser passwords/credit card steal; utilizes discord's webhooks to send information directly to discord.☆22Dec 8, 2020Updated 5 years ago
- This is a backdoor about discover network device ,and it can hidden reverse connecting the hacker's server with encrypt commuication 后渗透后…☆197Aug 29, 2015Updated 10 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago