KarmaHostage / gethspoitLinks
Finding Ethereum nodes which are vulnerable to RPC-attacks
☆31Updated 9 years ago
Alternatives and similar repositories for gethspoit
Users that are interested in gethspoit are comparing it to the libraries listed below
Sorting:
- A Blockchain And Smart Contract Based CTF☆17Updated 2 years ago
- Honeypot for router backdoor (TCP 32764)☆19Updated 11 years ago
- A Proof of Concept to show how blockchain can solve C2C persistence. PoC originally presented at EuskalHack Security Congress 2017, updat…☆22Updated 7 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 9 years ago
- Phishing Toolkit☆19Updated 7 years ago
- Clickjacking Proof-of-Concept Exploit☆25Updated 5 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆33Updated 3 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago
- ☆14Updated 8 years ago
- A DFIR tool to extract cryptocoin addresses and other indicators of compromise from binaries.☆56Updated 2 years ago
- WebDigger is a python based tool, specially created to get a company's unknown domain for pentestor.☆17Updated 9 years ago
- ☆91Updated 8 years ago
- hemingway is a simple and easy to use spear phishing helper.☆42Updated 9 years ago
- Wide internet scanner for etherum and other bitcoin mining devices using default SSH credentials☆48Updated 3 years ago
- Dexaran's Naming Service☆20Updated 2 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆49Updated 8 years ago
- The PoC files for ethereum client's JSON-RPC DNS Rebinding☆35Updated 7 years ago
- Node JS code for a set of Alexa voice skills designed to assist hackers and developers with common tasks☆56Updated 6 years ago
- ssh public host key scanner using shodan☆118Updated 6 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆37Updated 4 years ago
- A security write-up about the Paypal API & data leakage☆25Updated 9 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆66Updated 10 years ago
- Brisket is a collection of frontend scripts for masscan, zmap, and nmap, in addition data manipulation scripts☆29Updated 11 years ago
- Python script based on aireplay-ng to keep deauthenticating the specified stations from your WiFi network.☆50Updated 9 years ago
- A web spider for shodan.io without using the Developer API.☆32Updated 7 years ago
- Format string exploit generation☆10Updated 10 years ago
- Password cracking utility☆54Updated 4 years ago
- ☆24Updated 3 years ago
- Suite for Information gathering☆12Updated 7 years ago
- (Unofficial) Python API for cybercrime-tracker.net☆38Updated 7 years ago