Search the Community
Showing results for tags 'chrome '.
-
5 BEST CHROME EXTENSIONS FOR HACKERS 1. Tamper Data The Tamper Data extension ([Hidden Content]) provides such functionalities. It is an essential tool that supports ethical hacking processes through the Chrome web browser. 2. Hackbar The HackBar extension ([Hidden Content]) assists in hash generation, XSS queries, decoding, encoding, and SQL functions other than an interface. The extension helps users easily copy, read, and request URLs, 3. Open Port Check Tool The Open Port Check Tool extension ([Hidden Content]) helps hackers detect if a computer has any open ports. The extension alerts users to turn off all unused ports to reduce the possibility of an intrusion. 4. Request Maker Hackers find the Request Maker extension ([Hidden Content]) useful when conducting fuzz tests to detect security vulnerabilities and coding errors. The Request Maker tool simplifies the process since it is designed as a core pen-testing tool. 5. Penetration Testing Kit The Chrome-based Penetration Testing Kit ([Hidden Content]) contains a bundle of useful pen testing exercises for professional, ethical hackers. The extension provides an interface through which users can view and send responses and request information.
-
5 BEST CHROME EXTENSIONS FOR HACKERS 1. Tamper Data The Tamper Data extension provides such functionalities. It is an essential tool that supports ethical hacking processes through the Chrome web browser. 2. Hackbar The HackBar extension assists in hash generation, XSS queries, decoding, encoding, and SQL functions other than an interface. The extension helps users easily copy, read, and request URLs, 3. Open Port Check Tool The Open Port Check Tool extension helps hackers detect if a computer has any open ports. The extension alerts users to turn off all unused ports to reduce the possibility of an intrusion. 4. Request Maker Hackers find the Request Maker extension useful when conducting fuzz tests to detect security vulnerabilities and coding errors. The Request Maker tool simplifies the process since it is designed as a core pen-testing tool. 5. Penetration Testing Kit The Chrome-based Penetration Testing Kit contains a bundle of useful pen testing exercises for professional, ethical hackers. The extension provides an interface through which users can view and send responses and request information.
-
EvilSelenium is a new project that weaponizes Selenium to abuse Chrome. The current features right now are: Steal stored credentials (via autofill) Steal cookies Take screenshots of websites Dump Gmail/O365 emails Dump WhatsApp messages Download & exfiltrate files Add SSH keys to GitHub Or extend the existing functionality to suit your needs (e.g. Download files from the user’s GDrive/OneDrive). [hide][Hidden Content]]
-
- 2
-
- evilselenium:
- weaponizes
-
(and 3 more)
Tagged with:
-
Chromepass – Hacking Chrome Saved Passwords Chromepass is a python-based console application that generates a windows executable with the following features: Decrypt Chrome saved passwords Send a file with the login/password combinations remotely (email or reverse-http) Custom icon Completely undetectable by AntiVirus Engines AV Detection! The new client build methodology, practically ensures a 0% detection rate, even without AV-evasion tactics. If this becomes false in the future, some methods will be implemented to improve AV evasion. An example of the latest scans (note: within 10-12 hours we go from 0-2 detections to 32 detections so run the analysis on your own builds): [Hidden Content] Changelog v4.1 Fixed dependency issues Recreated the server (in rust) [hide][Hidden Content]]
- 1 reply
-
- 7
-
- chromepass
- v4.1
- (and 4 more)
-
How to always open Chrome browser in safe and anonymous mode? ✓Normally, all your web browsing information is saved, including cookies, passwords, and even the URL of the site you visited. * If you don't want this to happen and always browse the web anonymously and this information is not saved + Do the following steps * ShortCut from the Chrome browser on your desktop * Right-click on Chrome shortcuts and tap Properties * Come on the Shortcut tab * Find the target path Go to the end and close a space (Space) and write this phrase incognito- * In this case, every time you open the browser, it is in safe mode.
-
Grab cookies from Firefox, Chrome, Opera using a shortcut file (bypass SmartScreen/Defender) Legal disclaimer: Usage of HMMCOOKIES for attacking targets without prior mutual consent is illegal. It's the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program [hide][Hidden Content]]
-
- 1
-
- hmmcookies
- v1.0
- (and 6 more)
-
A simple Chrome Stealer / Chrome Recovery for Windows 7+. Native. Written in C++. Orphic META - Free Google Chrome Stealer / Password Recovery - GMAIL ONLY Features - View your own Chrome Passwords. - Generate Stub to get someone else's. - Receive Via Gmail. - Message Box. [HIDE][Hidden Content]] Server Scan [Hidden Content]
-
Chrome suffers from a use-after-free vulnerability due to a double call to IndexedDBConnection::Close. View the full article
-
- chrome
- indexeddbconnection::close
-
(and 1 more)
Tagged with:
-
Exploits Chrome ~LevelDBIteratorImpl Use-After-Free
1337day-Exploits posted a topic in Updated Exploits
Chrome suffers from a use-after-free vulnerability in ~LevelDBIteratorImpl. View the full article-
- chrome
- ~leveldbiteratorimpl
-
(and 1 more)
Tagged with:
-
Google Chrome suffers from an issue where it will leak all passwords for a given domain. View the full article
-
Exploits Google Chrome JS Execution Use-After-Free
1337day-Exploits posted a topic in Updated Exploits
JS execution inside ScriptForbiddenScope can lead to a use-after-free condition in Google Chrome. View the full article -
Chrome Web Store Escritorio Remoto de Chrome ofrecido por Chrome Remote Desktop Release Managers Para descargar la aplicación o la extensión en tu ordenador, inicia sesión en Chrome y habilita la sincronización o envíate un recordatorio (39282) Aplicaciones de oficina 0 usuarios Descripción general De Google Accede a otros ordenadores o permite que otro usuario acceda a tu ordenador de forma segura a través de Internet. Chrome Remote Desktop allows users to remotely access another computer through Chrome browser or a Chromebook. Computers can be made available on an short-term basis for scenarios such as ad hoc remote support, or on a more long-term basis for remote access to your applications and files. All connections are fully secured. Chrome Remote Desktop is fully cross-platform. Provide remote assistance to Windows, Mac and Linux users, or access your Windows (XP and above) and Mac (OS X 10.6 and above) desktops at any time, all from the Chrome browser on virtually any device, including Chromebooks. For information about privacy, please see the Google Privacy Policy and the Chrome Privacy Policy. For help or troubleshooting please click here: [Hidden Content] Stay tuned for future updates! [Hidden Content]
-
This exploit takes advantage of a use after free vulnerability in Google Chrome 72.0.3626.119 running on Windows 7 x86. The FileReader.readAsArrayBuffer function can return multiple references to the same ArrayBuffer object, which can be freed and overwritten with sprayed objects. The dangling ArrayBuffer reference can be used to access the sprayed objects, allowing arbitrary memory access from Javascript. This is used to write and execute shellcode in a WebAssembly object. The shellcode is executed within the Chrome sandbox, so you must explicitly disable the sandbox for the payload to be successful. View the full article
-
- chrome
- 72.0.3626.119
-
(and 2 more)
Tagged with:
-
Exploits Chrome NewFixedDoubleArray Integer Overflow
1337day-Exploits posted a topic in Updated Exploits
Chrome suffers from an integer overflow vulnerability in NewFixedDoubleArray. View the full article-
- chrome
- newfixeddoublearray
-
(and 2 more)
Tagged with:
-
Chrome suffers from a use-after-free vulnerability in FileChooserImpl. View the full article
-
- chrome
- filechooserimpl
-
(and 1 more)
Tagged with:
-
Exploits Chrome 73.0.3683.86 Stable Proof Of Concept
1337day-Exploits posted a topic in Updated Exploits
Chrome version 73.0.3683.86 stable exploit for chromium issue 941743, tested on Windows 10 x64, which leverages a flaw in the V8 javascript engine. View the full article-
- chrome
- 73.0.3683.86
-
(and 3 more)
Tagged with:
-
Exploits Chrome ReadableStream Internal Object Leak
1337day-Exploits posted a topic in Updated Exploits
Chrome suffers from an internal object leak vulnerability in ReadableStream. View the full article-
- chrome
- readablestream
-
(and 3 more)
Tagged with:
-
Chrome suffers from a type confusion vulnerability in JSPromise::TriggerPromiseReactions. View the full article
-
- chrome
- jspromise::triggerpromisereactions
-
(and 2 more)
Tagged with: