ValtteriL / OnionFermenter
A tool for creating bitcoin stealing phishing clones of onion services on large scale
☆30Updated last year
Related projects ⓘ
Alternatives and complementary repositories for OnionFermenter
- Legba recipes.☆41Updated 3 months ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆20Updated 7 months ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆42Updated last year
- bitdrain - remote p2p bandwidth/cpu overage attack against bitcoin, dogecoin, etc.☆37Updated 6 months ago
- Rust-based password mutator for brute force attacks☆13Updated last year
- Gadget IoC removal from HAK5's BashBunny☆17Updated last year
- ☆15Updated 4 months ago
- AI Powered Terminal Based Ethical Hacking Assistant☆51Updated 6 months ago
- Modular framework to exploit UPS devices☆61Updated last year
- List of Hardware Wallets for Digital Forensics☆26Updated 3 months ago
- Rubber Ducky powered by NeoKey☆20Updated 5 months ago
- ☆28Updated last year
- Capture screenshots of onion services on an onion service.☆49Updated 5 months ago
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆23Updated 7 months ago
- A distributed hashcat implementation using Salad Cloud and Hashtopolis☆19Updated 4 months ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆19Updated 9 months ago
- ☆34Updated 4 years ago
- ☆16Updated 3 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆34Updated last year
- Visualize BBOT scans in realtime with VivaGraphJS☆33Updated 2 weeks ago
- Basics on commands/tools/info on how to do binary exploitation on a mobile phone☆44Updated last year
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆20Updated 4 months ago
- masscan with exclusive excludes☆55Updated last year
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆105Updated last year
- ☆42Updated 2 years ago