KarmaHostage / gethspoitLinks
Finding Ethereum nodes which are vulnerable to RPC-attacks
☆31Updated 9 years ago
Alternatives and similar repositories for gethspoit
Users that are interested in gethspoit are comparing it to the libraries listed below
Sorting:
- A Blockchain And Smart Contract Based CTF☆16Updated 2 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆33Updated 3 years ago
- A Proof of Concept to show how blockchain can solve C2C persistence. PoC originally presented at EuskalHack Security Congress 2017, updat…☆22Updated 7 years ago
- ☆24Updated 3 years ago
- A web spider for shodan.io without using the Developer API.☆31Updated 7 years ago
- Honeypot for router backdoor (TCP 32764)☆19Updated 11 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 4 years ago
- Clickjacking Proof-of-Concept Exploit☆25Updated 5 years ago
- Dexaran's Naming Service☆20Updated 2 years ago
- Python script based on aireplay-ng to keep deauthenticating the specified stations from your WiFi network.☆50Updated 9 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 8 years ago
- WebDigger is a python based tool, specially created to get a company's unknown domain for pentestor.☆17Updated 9 years ago
- hemingway is a simple and easy to use spear phishing helper.☆42Updated 8 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Updated 9 years ago
- A security write-up about the Paypal API & data leakage☆25Updated 9 years ago
- ssh public host key scanner using shodan☆117Updated 6 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆65Updated 9 years ago
- Phishing Toolkit☆20Updated 7 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 12 years ago
- Format string exploit generation☆10Updated 10 years ago
- ☆91Updated 8 years ago
- Blockchains. Destruction. Mayhem.☆50Updated 2 years ago
- A DFIR tool to extract cryptocoin addresses and other indicators of compromise from binaries.☆56Updated 2 years ago
- Efficient clustering of MASSCAN results☆12Updated 8 years ago
- ~ BannerGrab☆25Updated 9 years ago
- 0x88 exploit pack Decoded☆27Updated 11 years ago
- lulz: automated webstalking tool☆52Updated 9 years ago
- This is an intentionally vulnerable smart contract truffle deployment aimed at allowing those interested in smart contract security to ex…☆119Updated 7 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago