KarmaHostage / gethspoitLinks
Finding Ethereum nodes which are vulnerable to RPC-attacks
☆31Updated 9 years ago
Alternatives and similar repositories for gethspoit
Users that are interested in gethspoit are comparing it to the libraries listed below
Sorting:
- The PoC files for ethereum client's JSON-RPC DNS Rebinding☆35Updated 7 years ago
- A Blockchain And Smart Contract Based CTF☆17Updated 2 years ago
- A Proof of Concept to show how blockchain can solve C2C persistence. PoC originally presented at EuskalHack Security Congress 2017, updat…☆23Updated 7 years ago
- A Purposefully Vulnerable Blockchain☆52Updated 4 years ago
- ☆14Updated 7 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆33Updated 3 years ago
- This is an intentionally vulnerable smart contract truffle deployment aimed at allowing those interested in smart contract security to ex…☆119Updated 7 years ago
- A DFIR tool to extract cryptocoin addresses and other indicators of compromise from binaries.☆56Updated 2 years ago
- Honeypot for router backdoor (TCP 32764)☆19Updated 11 years ago
- Dexaran's Naming Service☆20Updated 2 years ago
- A web spider for shodan.io without using the Developer API.☆31Updated 7 years ago
- Scrooge McEtherface is an Ethereum auto-looter that was presented at DEFCON 2019. It uses symbolic execution & SMT solving to generically…☆151Updated 2 years ago
- ☆24Updated 3 years ago
- Blockchains. Destruction. Mayhem.☆50Updated 3 years ago
- Clickjacking Proof-of-Concept Exploit☆25Updated 5 years ago
- Recover the private key from signed DSA messages. (multiple signed messages, static coefficient 'k')☆39Updated 7 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 12 years ago
- Monitor traffic for unencrypted data and display a dashboard.☆15Updated 8 years ago
- An RPC attack framework for Blockchain nodes.☆95Updated 2 years ago
- ☆91Updated 8 years ago
- Phishing Toolkit☆20Updated 7 years ago
- A tool for checking BigSpender vulnerability in your Bitcoin wallet☆38Updated 4 years ago
- Complete examples of solidity exploits☆13Updated 8 years ago
- Ethereum Bug Bounty Submission: Sending Negative Value Transactions☆19Updated 3 years ago
- Format string exploit generation☆10Updated 10 years ago
- DNS Sub-domain brute forcer, in Python + gevent☆51Updated 9 years ago
- WebDigger is a python based tool, specially created to get a company's unknown domain for pentestor.☆17Updated 9 years ago
- hemingway is a simple and easy to use spear phishing helper.☆42Updated 9 years ago
- The Decentralized Application Security Project☆238Updated 4 years ago
- A tool for fuzzing for ports that allow outgoing connections☆17Updated 7 years ago