KarmaHostage / gethspoitLinks
Finding Ethereum nodes which are vulnerable to RPC-attacks
☆32Updated 9 years ago
Alternatives and similar repositories for gethspoit
Users that are interested in gethspoit are comparing it to the libraries listed below
Sorting:
- A Proof of Concept to show how blockchain can solve C2C persistence. PoC originally presented at EuskalHack Security Congress 2017, updat…☆21Updated 7 years ago
- The PoC files for ethereum client's JSON-RPC DNS Rebinding☆35Updated 7 years ago
- A Burp Plugin for Detecting Weaknesses in Content Security Policies☆10Updated 9 years ago
- Pentest environment scaffolding. Supporting role in Kali Linux.☆12Updated 5 years ago
- A Blockchain And Smart Contract Based CTF☆16Updated last year
- Recover the private key from signed DSA messages. (multiple signed messages, static coefficient 'k')☆38Updated 7 years ago
- A Purposefully Vulnerable Blockchain☆51Updated 4 years ago
- Complete examples of solidity exploits☆13Updated 7 years ago
- Wide internet scanner for etherum and other bitcoin mining devices using default SSH credentials☆45Updated 3 years ago
- WebDigger is a python based tool, specially created to get a company's unknown domain for pentestor.☆17Updated 8 years ago
- Mass HTTP brute forcer to detect directories and interesting technologies☆10Updated 8 years ago
- 0x88 exploit pack Decoded☆28Updated 10 years ago
- ☆13Updated 7 years ago
- ☆17Updated 2 years ago
- Clickjacking Proof-of-Concept Exploit☆25Updated 4 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆34Updated 3 years ago
- Format string exploit generation☆10Updated 9 years ago
- lulz: automated webstalking tool☆52Updated 9 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 4 years ago
- Python script based on aireplay-ng to keep deauthenticating the specified stations from your WiFi network.☆49Updated 9 years ago
- Phishing Toolkit☆20Updated 7 years ago
- Capstone: Keylogger Trojan☆35Updated 7 years ago
- Monitor traffic for unencrypted data and display a dashboard.☆15Updated 7 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 12 years ago
- Password cracking utility☆53Updated 4 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆17Updated 7 years ago
- Efficient clustering of MASSCAN results☆12Updated 8 years ago
- A configurable XPath/XML injection testbed☆33Updated 11 years ago
- An automated Python + Ruby based XXE Exploiter (GUI + CLI)☆19Updated 8 years ago