Chromepass is a python-based console application that generates a windows executable with the following features:
AV Detection
Due to the way this has been coded, it is currently fully undetected. Here are some links to scans performed using a variety of websites
Getting Started
Dependencies & Requirements
This is a very simple application, which uses only:
Installation
> cd chromepass
> pip install -r requirements.txt
If any errors occur make sure you’re running on the proper environment (if applcable) and that you have python 3.6+ (preferably 3.7.4). If the errors persist, try:
> python -m pip install –upgrade pip
> python -m pip install -r requirements.txt
Usage
Chromepass is very straightforward. Start by running:
> python create_server.py
It will ask you to select between two options:
Note: To set a custom icon, replace icon.ico by the desired icon with the same name and format.
Also Read – Frida-Fuzzer : Experimental Fuzzer Used For API In-Memory Fuzzing
Todo
Errors, Bugs & feature requests
If you find an error or a bug, please report it as an issue. If you wish to suggest a feature or an improvement please report it in the issue pages.
Please follow the templates shown when creating the issue.
Learn More
For access to a community full of aspiring computer security experts, ranging from the complete beginner to the seasoned veteran, join our Discord Server: WhiteHat Hacking
If you wish to contact me, you can do so via: marionascimento@itsec.us
Disclaimer
I am not responsible for what you do with the information and code provided. This is intended for professional or educational purposes only.
Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…
JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…