Electron-Probe leverages the Node variant of the Chrome Debugging Protocol to execute JavaScript payloads inside of target Electron applications. This allows an attacker to extract secrets and manipulate the application as part of their post-exploitation workflow.
☆31Jan 13, 2026Updated 2 months ago
Alternatives and similar repositories for electron-probe
Users that are interested in electron-probe are comparing it to the libraries listed below
Sorting:
- GoLang Scripting Expert, a repo for template scripts regarding basic golang functions, many with a security focus☆22Jun 22, 2020Updated 5 years ago
- Swift code to run a dylib on disk☆16May 9, 2022Updated 3 years ago
- If you have any questions, please open an issue.☆25Apr 6, 2022Updated 3 years ago
- TypeScript/JavaScript client libraries for Sliver☆25Updated this week
- Semgrep rules to identify GWT attack surface☆12Apr 28, 2022Updated 3 years ago
- ObjectiveC CLI tool for interacting with macOS Keychain☆82Oct 10, 2022Updated 3 years ago
- CLI tool written in Go to generate Canary Tokens from https://canarytokens.org☆13Aug 22, 2025Updated 6 months ago
- Apfell C2 Server for the Google Chrome Extension Payload☆12Aug 12, 2020Updated 5 years ago
- Abusing exceptions for code execution.☆113Jan 30, 2023Updated 3 years ago
- LoadLibrary for offensive operations☆33Dec 14, 2021Updated 4 years ago
- easy dll proxying in go☆14Apr 24, 2022Updated 3 years ago
- Discover DYLD_INSERT_LIBRARIES hijacks on macOS☆45Sep 15, 2022Updated 3 years ago
- Swift code to programmatically perform dylib injection☆52Oct 29, 2022Updated 3 years ago
- A script to attack users who are RDPing into a machine and recurse this attack. For security testers and attack simulations.☆19Jun 29, 2017Updated 8 years ago
- Adversary Simulators High-Fidelity Intelligence and Reporting Toolkit☆169Mar 11, 2026Updated last week
- Deployment code for ashirt-server☆20Oct 15, 2025Updated 5 months ago
- ☆33Aug 14, 2020Updated 5 years ago
- A DLL that serves OutputDebugString content over a TCP connection☆35Sep 23, 2021Updated 4 years ago
- ☆26Dec 29, 2021Updated 4 years ago
- Abuse the node.js inspector mechanism in order to force any node.js/electron/v8 based process to execute arbitrary javascript code.☆333Sep 9, 2024Updated last year
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- ELF Beacon Object File (BOF) Template☆19Nov 18, 2024Updated last year
- Python script to exploit confluence path traversal vulnerability cve-2019-3398☆15Jun 6, 2019Updated 6 years ago
- Keyhack - Golang API token/webhook validator☆16Mar 20, 2025Updated last year
- Proxy Unix applications in the terminal☆116Apr 14, 2021Updated 4 years ago
- Source Code Management Attack Toolkit☆13Aug 1, 2022Updated 3 years ago
- ☆12Dec 2, 2021Updated 4 years ago
- Cross-platform proxy selection with optional native authentication negotiation☆53Feb 25, 2023Updated 3 years ago
- Aggressor script that gets the latest commands from CobaltStrikes web site and creates an aggressor script based on tool options.☆22Oct 6, 2021Updated 4 years ago
- In 'n Out - See what goes in and comes out of PEs☆35May 12, 2022Updated 3 years ago
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Jan 6, 2022Updated 4 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Nov 4, 2022Updated 3 years ago
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Mar 9, 2025Updated last year
- Encrypt embedded go files using age.☆49Oct 21, 2021Updated 4 years ago
- ☆11Jul 19, 2020Updated 5 years ago
- Are you forwarding DNS traffic to another server for some reason, but want to make sure only queries for certain names are passed? Say no…☆20Oct 16, 2022Updated 3 years ago
- practice☆69Mar 19, 2020Updated 6 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Dec 1, 2023Updated 2 years ago
- a collection of profiles for macOS designed for penetration testing or red teaming☆37Apr 15, 2019Updated 6 years ago