KarmaHostage / gethspoit
Finding Ethereum nodes which are vulnerable to RPC-attacks
☆33Updated 8 years ago
Alternatives and similar repositories for gethspoit:
Users that are interested in gethspoit are comparing it to the libraries listed below
- A Burp Plugin for Detecting Weaknesses in Content Security Policies☆10Updated 9 years ago
- A Proof of Concept to show how blockchain can solve C2C persistence. PoC originally presented at EuskalHack Security Congress 2017, updat…☆21Updated 6 years ago
- The PoC files for ethereum client's JSON-RPC DNS Rebinding☆35Updated 7 years ago
- Clickjacking Proof-of-Concept Exploit☆25Updated 4 years ago
- All tools you needed during penetration testing.☆17Updated 7 years ago
- Dexaran's Naming Service☆19Updated last year
- Complete examples of solidity exploits☆13Updated 7 years ago
- Ethereum Bug Bounty Submission: Sending Negative Value Transactions☆18Updated 3 years ago
- A Blockchain And Smart Contract Based CTF☆16Updated last year
- WebDigger is a python based tool, specially created to get a company's unknown domain for pentestor.☆17Updated 8 years ago
- ☆13Updated 7 years ago
- Phishing Toolkit☆20Updated 7 years ago
- Some examples of Solidity tricks and writeups of valuable bugs (in progress)☆45Updated 6 years ago
- Monitor traffic for unencrypted data and display a dashboard.☆15Updated 7 years ago
- Recover the private key from signed DSA messages. (multiple signed messages, static coefficient 'k')☆38Updated 6 years ago
- Blockchains. Destruction. Mayhem.☆50Updated 2 years ago
- The official repo of BSIS☆14Updated 13 years ago
- ~ BannerGrab☆26Updated 8 years ago
- Pentest environment scaffolding. Supporting role in Kali Linux.☆12Updated 4 years ago
- Search and extract blob files on the Ethereum Blockchain network☆45Updated 3 years ago
- A Purposefully Vulnerable Blockchain☆50Updated 3 years ago
- ☆11Updated 7 years ago
- Concurrently test bing results for shellshock vulnerability☆42Updated 10 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 11 years ago
- Generate customized and undetectable exploits for Metasploit.☆23Updated 7 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 8 years ago
- Cpanel Brute Force Tool (Perl)☆16Updated 11 years ago
- Format string exploit generation☆10Updated 9 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆34Updated 2 years ago
- Wide internet scanner for etherum and other bitcoin mining devices using default SSH credentials☆43Updated 2 years ago