ValtteriL / OnionFermenterLinks
A tool for creating bitcoin stealing phishing clones of onion services on large scale
☆35Updated 2 years ago
Alternatives and similar repositories for OnionFermenter
Users that are interested in OnionFermenter are comparing it to the libraries listed below
Sorting:
- ☆13Updated 2 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆55Updated 2 years ago
- Interactive shell to execute commands anonymously using Proxychains and Tor☆48Updated 2 years ago
- Execute code using Azure Automation service without getting charged☆143Updated 2 years ago
- Legba recipes.☆51Updated last year
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆17Updated 3 years ago
- We have compiled an exhaustive list of cryptocurrency exchange hacks [ 2011 – 2022 ] – you will be amazed at how much has been stolen ove…☆12Updated 2 years ago
- Social Engineering Browser Update Attack.☆58Updated 2 years ago
- Gadget IoC removal from HAK5's BashBunny☆20Updated 2 years ago
- Github repository with Write Up, AutoPwn, Tools, Videos of CTF's from HackTheBox and TryHackMe☆19Updated 3 years ago
- Replace any BTC, XMR, XLM, ETH, XRP, LTC, BCH, NEC, ZCASH, DASH, DOGE, WMR, WMG, WMX, Yandex money, Qiwi address to yours☆34Updated 4 years ago
- Rubber Ducky powered by NeoKey☆27Updated last year
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Updated last year
- A non-exhaustive list of hacktools related to EMV fraud☆60Updated 4 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆19Updated 2 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆23Updated last year
- mapAccountHijack is a tool designed to carry out a MAP Account hijack attack, which exploits the Message Access Profile (MAP) in Bluetoot…☆56Updated 9 months ago
- Password lists generated by deep learning algorithms.☆32Updated 5 years ago
- Anubis 7.0☆27Updated last year
- Simple Tool for webhacking☆11Updated 2 years ago
- Proof of concept denial of service over TOR stress test tool☆41Updated 7 years ago
- This is a phishing ready platform. Unlike other phishing methods, EvilnoVNC allows you to bypass 2FA using a real browser via noVNC conn…☆10Updated 2 years ago
- Command line interface to interact with hashes.com escrow service.☆39Updated 4 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆65Updated last year
- IP2Tor allows to determine whether an IP address is a Tor exit node.☆30Updated 5 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18Updated 3 years ago
- ☆19Updated 2 years ago
- Bitcoin Randstorm Exploit - Very Fast Private Key and Address Generator☆75Updated last year
- A tool to automatically redirect all traffic through the TOR and change the IP every 0 to x seconds. And provides a custom MAC address. <…☆94Updated last year
- PassDetective is a command-line tool that scans shell command history to detect mistakenly written passwords, API keys, and secrets. Usin…☆139Updated last year