Red Team Leaders
search
Ctrlk
  • Welcome
  • DOCUMENTATION
    • Adversary Emulation Guide
    • Red Team Operations Framework
    • Purple Team Operations
    • The first 90 days of a new Red Team
  • Red Team Infrastructure
    • Command and Controlchevron-right
  • OFFENSIVE SECURITY
    • Defense Evasionchevron-right
    • Credential Accesschevron-right
    • Windows Internals and APIchevron-right
    • Privilege Escalationchevron-right
    • Malware Developmentchevron-right
      • Chrome Password Dumper: Guide to Browser Password Recovery
    • Initial Accesschevron-right
  • Offensive Artificial Intelligencechevron-right
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. OFFENSIVE SECURITY

Malware Development

Chrome Password Dumper: Guide to Browser Password Recoverychevron-right
PreviousObtaining SYSTEM privilege via a vulnerable driver using a Userland programchevron-leftNextChrome Password Dumper: Guide to Browser Password Recoverychevron-right