vishwa5854 / Chrome-Password-StealerLinks
It exploits the chrome vulnerability and gets the all saved credentials in chrome
☆12Updated 5 years ago
Alternatives and similar repositories for Chrome-Password-Stealer
Users that are interested in Chrome-Password-Stealer are comparing it to the libraries listed below
Sorting:
- Passwordless RDP Session Hijacking☆69Updated 3 years ago
- crack login and pass☆12Updated 6 years ago
- Masking the Sethc.exe backdoor with an anti-detection system.☆29Updated 7 years ago
- ☆10Updated 2 years ago
- Word Macro Virus that has a Powershell based Download & Execute Payload☆22Updated 8 years ago
- generate and crack identity card☆61Updated 8 years ago
- $2100 .Exe to .Doc Exploit (Python)☆53Updated 4 years ago
- HTTPS-based Remote Administration Tool (RAT)☆29Updated 8 years ago
- POC of sudo password stealer☆37Updated 4 years ago
- A python Code to obfuscate any non-fud python payload and generate a ready to use FUD Python executable script☆24Updated 5 years ago
- Wifi Stealer☆27Updated 4 years ago
- PowerShell Reverse HTTPs Shell☆28Updated 10 years ago
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆23Updated 7 years ago
- njRAT C# Stub - Fixed For PowerShell☆58Updated 5 years ago
- Simple Linux RootKit written in python☆10Updated 7 years ago
- Phishing webapp generator☆42Updated 6 years ago
- Burp Suite Extension providing Google Hacking Interface☆16Updated 12 years ago
- A script to obfuscate powershell payloads , bypassing AMSI.dll and Windows Defender☆38Updated 5 years ago
- IOS/MAC Denial-Of-Service [POC/EXPLOIT FOR MASSIVE ATTACK TO IOS/MAC IN NETWORK]☆36Updated 6 years ago
- A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a dec…☆32Updated 6 years ago
- Mister Spy Website Vulnerability Scanner & Auto Exploiter☆4Updated 6 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- Keylogger to python☆9Updated 3 years ago
- The Metasploit GUI☆89Updated 8 years ago
- using VBS to download and install a powershell malware☆41Updated 6 years ago
- Better Remote Access Trojan☆50Updated 8 years ago
- Social Engineering: Simple way to make a fake file for Backdoors☆25Updated 2 years ago
- Avoidz tool to bypass most A.V softwares☆138Updated 7 years ago
- ransomware chiffre tous les fichiers,télécharge une image depuis un serveur distant puis change le fond d'ecran après le chiffrement des …☆25Updated 4 years ago
- A script to attack users who are RDPing into a machine and recurse this attack. For security testers and attack simulations.☆19Updated 8 years ago