KarmaHostage / gethspoitLinks
Finding Ethereum nodes which are vulnerable to RPC-attacks
☆31Updated 9 years ago
Alternatives and similar repositories for gethspoit
Users that are interested in gethspoit are comparing it to the libraries listed below
Sorting:
- A Blockchain And Smart Contract Based CTF☆17Updated 2 years ago
- Honeypot for router backdoor (TCP 32764)☆19Updated 12 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆37Updated 4 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆33Updated 3 years ago
- WebDigger is a python based tool, specially created to get a company's unknown domain for pentestor.☆17Updated 9 years ago
- ☆14Updated 8 years ago
- Phishing Toolkit☆19Updated 7 years ago
- Clickjacking Proof-of-Concept Exploit☆25Updated 5 years ago
- Dexaran's Naming Service☆20Updated 2 years ago
- A DFIR tool to extract cryptocoin addresses and other indicators of compromise from binaries.☆56Updated 2 years ago
- A tool for fuzzing for ports that allow outgoing connections☆17Updated 7 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 12 years ago
- ☆24Updated 4 years ago
- Efficient clustering of MASSCAN results☆12Updated 9 years ago
- Monitor traffic for unencrypted data and display a dashboard.☆15Updated 8 years ago
- 0x88 exploit pack Decoded☆27Updated 11 years ago
- The PoC files for ethereum client's JSON-RPC DNS Rebinding☆35Updated 8 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 12 years ago
- Python script based on aireplay-ng to keep deauthenticating the specified stations from your WiFi network.☆50Updated 9 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆66Updated 10 years ago
- UNMAINTAINED - Vulnerability scanner and information gatherer for the Concrete5 CMS☆20Updated 5 years ago
- Complete examples of solidity exploits☆13Updated 8 years ago
- Automatically parses and attacks BloodHound-generated graphs☆43Updated 7 years ago
- A Purposefully Vulnerable Blockchain☆52Updated 4 years ago
- Format string exploit generation☆10Updated 10 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆49Updated 8 years ago
- This is an intentionally vulnerable smart contract truffle deployment aimed at allowing those interested in smart contract security to ex…☆120Updated 7 years ago
- ~ BannerGrab☆25Updated 9 years ago
- A web spider for shodan.io without using the Developer API.☆33Updated 8 years ago
- XMPP Man-in-the-Middle, quick & dirty☆41Updated 11 years ago