ValtteriL / OnionFermenter
A tool for creating bitcoin stealing phishing clones of onion services on large scale
☆31Updated last year
Alternatives and similar repositories for OnionFermenter:
Users that are interested in OnionFermenter are comparing it to the libraries listed below
- Self replicating and automatically spreading SSH worm that recovers login credentials☆51Updated last year
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Updated 10 months ago
- bitdrain - remote p2p bandwidth/cpu overage attack against bitcoin, dogecoin, etc.☆40Updated 9 months ago
- OnionSprout is a tool to run publicaly-accessible web services, for example from Raspberry Pi in your home, without a public IP.☆11Updated 4 years ago
- Scrape Pastebin API to collect daily pastes, setup a wordlist and be alerted by email when you have a match.☆48Updated 2 weeks ago
- Facial Recognition and its dangers for Special Forces Operatives☆24Updated last year
- Create Containerized Clearnet Proxies☆30Updated 5 years ago
- Bitcoin Randstorm Exploit - Very Fast Private Key and Address Generator☆61Updated last year
- ☆27Updated last year
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆13Updated 2 years ago
- Phunter is an osint tool allowing you to find various information via a phone number 🔎📞☆15Updated 10 months ago
- This is a phishing ready platform. Unlike other phishing methods, EvilnoVNC allows you to bypass 2FA using a real browser via noVNC conn…☆11Updated last year
- pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching☆12Updated 2 years ago
- An End to End Encrypted SMS and SMS Tunneling app☆40Updated last year
- We have compiled an exhaustive list of cryptocurrency exchange hacks [ 2011 – 2022 ] – you will be amazed at how much has been stolen ove…☆12Updated 2 years ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆18Updated last year
- Chat GPT Things by Taylor Newsome☆12Updated 11 months ago
- Replace any BTC, XMR, XLM, ETH, XRP, LTC, BCH, NEC, ZCASH, DASH, DOGE, WMR, WMG, WMX, Yandex money, Qiwi address to yours☆27Updated 3 years ago
- List of Hardware Wallets for Digital Forensics☆28Updated 2 months ago
- Basics on commands/tools/info on how to do a forensic analysis of a mobile phone☆21Updated last year
- Capture screenshots of onion services on an onion service.☆50Updated 8 months ago
- Legba recipes.☆44Updated 6 months ago
- IP2Tor allows to determine whether an IP address is a Tor exit node.☆29Updated 4 years ago
- A collection of scripts to steal BTC from Lightning Network enabled custodial services. Only for educational purpose! Share your findings…☆17Updated 3 years ago
- ☆51Updated 3 years ago
- fully Undetectable payload generator for metasploit☆11Updated 2 years ago
- Gadget IoC removal from HAK5's BashBunny☆18Updated last year
- Midnight Sea: navigating in the waters of dark web markets☆31Updated last year
- A Hacking and Pentesting Tool for Windows☆19Updated 10 months ago
- Repository of tools used in my blog☆50Updated 10 months ago