SharkExec
Windows credential extractor
A C# toolkit designed to extract credentials and browsing history from Windows systems.
内网渗透|红队工具|C#内存加载|cobaltstrike
295 stars
6 watching
44 forks
Language: C#
last commit: over 2 years ago cobaltstrike-cnapentestingredteam
Related projects:
Repository | Description | Stars |
---|---|---|
djhohnstein/sharpweb | A .NET project that extracts saved browser credentials from Google Chrome, Firefox, and Internet Explorer/Edge. | 514 |
b4rtik/sharpkatz | A porting of mimikatz commands for Windows credential extraction and manipulation | 983 |
hayasec/360safebrowsergetpass | Automated tool to extract and decrypt browser passwords from 360 Safe Browser | 611 |
tokyoneon/credphish | A PowerShell script designed to collect user passwords and exfiltrate them via DNS | 288 |
lgandx/pcredz | A tool that extracts various types of credentials and information from network captures or live interfaces. | 2,033 |
djhohnstein/sharpchromium | Tool to extract data from Chromium-based browsers | 698 |
uknowsec/sharpdecryptpwd | A tool for extracting passwords from various Windows applications | 1,177 |
dirkjanm/adconnectdump | A tool suite to extract and decrypt sensitive Azure AD credentials from Azure AD Connect servers | 641 |
hagrid29/bof-credui | A C-based tool for invoking Windows credential prompt using the CredUIPromptForWindowsCredentials API | 18 |
0x3rhy/getclipboard | A plugin for Cobalt Strike's reflective DLL injection framework to extract clipboard content | 12 |
unapibageek/ctfr | A tool that exploits Certificate Transparency logs to extract subdomains from HTTPS websites. | 1,976 |
eladshamir/whisker | A tool for manipulating Active Directory user and computer accounts by adding shadow credentials. | 824 |
moyix/creddump | Extracts various credentials and secrets from Windows registry hives. | 245 |
microsoft/artifacts-credprovider | Automates credential acquisition for Azure Artifacts feeds in .NET development workflows | 786 |
ccob/sweetpotato | Provides tools and techniques for exploiting Windows privilege escalation vulnerabilities from service accounts to SYSTEM. | 1,638 |