KarmaHostage / gethspoit
Finding Ethereum nodes which are vulnerable to RPC-attacks
☆33Updated 8 years ago
Alternatives and similar repositories for gethspoit:
Users that are interested in gethspoit are comparing it to the libraries listed below
- A Blockchain And Smart Contract Based CTF☆16Updated last year
- A Proof of Concept to show how blockchain can solve C2C persistence. PoC originally presented at EuskalHack Security Congress 2017, updat…☆21Updated 7 years ago
- Complete examples of solidity exploits☆13Updated 7 years ago
- Dexaran's Naming Service☆20Updated 2 years ago
- Monitor traffic for unencrypted data and display a dashboard.☆15Updated 7 years ago
- ☆24Updated 3 years ago
- A DFIR tool to extract cryptocoin addresses and other indicators of compromise from binaries.☆56Updated last year
- The PoC files for ethereum client's JSON-RPC DNS Rebinding☆35Updated 7 years ago
- Sometimes Ethereum nodes are vulnerable to a JSON-RPC exploit - this is a handful of scripts to secure those funds.☆8Updated 6 years ago
- Ethereum Bug Bounty Submission: Sending Negative Value Transactions☆18Updated 3 years ago
- A Burp Plugin for Detecting Weaknesses in Content Security Policies☆10Updated 9 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 4 years ago
- Pentest environment scaffolding. Supporting role in Kali Linux.☆12Updated 4 years ago
- ☆13Updated 7 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆34Updated 2 years ago
- Recovery of monero address and private view and spend keys using MyMonero's mnemonic seed☆14Updated 9 years ago
- Go SDK of Malicious Wallet Address Database☆11Updated 6 years ago
- An RPC attack framework for Blockchain nodes.☆95Updated last year
- A tool for fuzzing for ports that allow outgoing connections☆18Updated 6 years ago
- BlackHat Europe 2017 Slides☆26Updated 7 years ago
- Search and extract blob files on the Ethereum Blockchain network☆45Updated 3 years ago
- Automated Scanning, Pentesting , Exploiting and Reporting☆21Updated 3 years ago
- Tool for auditing Ethereum contracts☆55Updated 7 years ago
- exploit of smt proxyoverflow bug, i.e. CVE-2018–10376☆9Updated 6 years ago
- Kylin EOS Enhancement Proposals☆15Updated 6 years ago
- USB-Rubber-Ducky Payload - Mimikatz in Memory w UAC Bypass☆35Updated 9 years ago
- Blockchains. Destruction. Mayhem.☆50Updated 2 years ago
- Weekly industry summary☆17Updated 6 years ago
- All tools you needed during penetration testing.☆17Updated 8 years ago
- Some examples of Solidity tricks and writeups of valuable bugs (in progress)☆45Updated 6 years ago