ValtteriL / OnionFermenterLinks
A tool for creating bitcoin stealing phishing clones of onion services on large scale
☆33Updated 2 years ago
Alternatives and similar repositories for OnionFermenter
Users that are interested in OnionFermenter are comparing it to the libraries listed below
Sorting:
- Execute code using Azure Automation service without getting charged☆143Updated last year
- ☆13Updated 2 years ago
- Discord bot for the Shodan API - OSINT tool☆78Updated last year
- Rubber Ducky powered by NeoKey☆27Updated last year
- Interactive shell to execute commands anonymously using Proxychains and Tor☆44Updated 2 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆55Updated 2 years ago
- Legba recipes.☆51Updated last year
- This is a phishing ready platform. Unlike other phishing methods, EvilnoVNC allows you to bypass 2FA using a real browser via noVNC conn…☆10Updated 2 years ago
- IP2Tor allows to determine whether an IP address is a Tor exit node.☆30Updated 5 years ago
- Gadget IoC removal from HAK5's BashBunny☆20Updated 2 years ago
- Replace any BTC, XMR, XLM, ETH, XRP, LTC, BCH, NEC, ZCASH, DASH, DOGE, WMR, WMG, WMX, Yandex money, Qiwi address to yours☆31Updated 4 years ago
- Hacking the Singularity. Deep learning hacking. Weaponizing AI in Offensive security☆104Updated last year
- Proof of concept denial of service over TOR stress test tool☆41Updated 7 years ago
- Github repository with Write Up, AutoPwn, Tools, Videos of CTF's from HackTheBox and TryHackMe☆19Updated 3 years ago
- Password lists generated by deep learning algorithms.☆32Updated 5 years ago
- A tool to automatically redirect all traffic through the TOR and change the IP every 0 to x seconds. And provides a custom MAC address. <…☆91Updated last year
- IPAnalyzer is an IP Address Tracker OSINT ethical hacking tool built for Linux distributions, designed to gather detailed information abo…☆48Updated last month
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆17Updated 3 years ago
- Command line interface to interact with hashes.com escrow service.☆38Updated 3 months ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Updated last year
- PEGASUS-NEO is a comprehensive penetration testing framework designed for security professionals and ethical hackers. It combines multipl…☆78Updated this week
- A CRYPTOJACKING PROGRAM (MALWARE) >:)☆35Updated 4 years ago
- A robust information gathering tool for large scale reconnaissance on Internet Relay Chat servers 🛰️☆50Updated 2 years ago
- Capture screenshots of onion services on an onion service.☆72Updated last year
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆108Updated 2 years ago
- bitdrain - remote p2p bandwidth/cpu overage attack against bitcoin, dogecoin, etc.☆38Updated last year
- List of Hardware Wallets for Digital Forensics☆28Updated 10 months ago
- A non-exhaustive list of hacktools related to EMV fraud☆61Updated 4 years ago
- Ded Security Framework is a tool aimed at security professionals☆36Updated last year
- Official python agent for using the distributed hashcracker Hashtopolis☆77Updated 3 weeks ago