KarmaHostage / gethspoit
Finding Ethereum nodes which are vulnerable to RPC-attacks
☆31Updated 8 years ago
Related projects ⓘ
Alternatives and complementary repositories for gethspoit
- Complete examples of solidity exploits☆13Updated 7 years ago
- A Proof of Concept to show how blockchain can solve C2C persistence. PoC originally presented at EuskalHack Security Congress 2017, updat…☆21Updated 6 years ago
- A Blockchain And Smart Contract Based CTF☆16Updated last year
- ☆13Updated 6 years ago
- The PoC files for ethereum client's JSON-RPC DNS Rebinding☆35Updated 6 years ago
- Recovery of monero address and private view and spend keys using MyMonero's mnemonic seed☆14Updated 8 years ago
- Ethereum Bug Bounty Submission: Sending Negative Value Transactions☆18Updated 2 years ago
- exploit of smt proxyoverflow bug, i.e. CVE-2018–10376☆9Updated 6 years ago
- ☆24Updated 2 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆34Updated 2 years ago
- A Burp Plugin for Detecting Weaknesses in Content Security Policies☆10Updated 8 years ago
- Example Manticore scripts☆68Updated 11 months ago
- LD_PRELOAD rootkit☆21Updated 10 years ago
- ~ BannerGrab☆26Updated 8 years ago
- All tools you needed during penetration testing.☆17Updated 7 years ago
- For BurpSuite Plugins☆11Updated 9 years ago
- Clickjacking Proof-of-Concept Exploit☆25Updated 4 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 11 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Updated 6 years ago
- Dexaran's Naming Service☆19Updated last year
- Honeypot for router backdoor (TCP 32764)☆16Updated 10 years ago
- Audit Proposals and Reports for RandomX☆12Updated 5 years ago
- Broken web app intentionally built with pentesting obstacles☆15Updated 5 years ago
- A DFIR tool to extract cryptocoin addresses and other indicators of compromise from binaries.☆57Updated last year
- Monitor traffic for unencrypted data and display a dashboard.☆15Updated 7 years ago
- BlackHat Europe 2017 Slides☆26Updated 6 years ago
- Efficient clustering of MASSCAN results☆12Updated 7 years ago
- Phishing Toolkit☆19Updated 6 years ago