ValtteriL / OnionFermenterLinks
A tool for creating bitcoin stealing phishing clones of onion services on large scale
☆33Updated 2 years ago
Alternatives and similar repositories for OnionFermenter
Users that are interested in OnionFermenter are comparing it to the libraries listed below
Sorting:
- ☆13Updated 2 years ago
- Replace any BTC, XMR, XLM, ETH, XRP, LTC, BCH, NEC, ZCASH, DASH, DOGE, WMR, WMG, WMX, Yandex money, Qiwi address to yours☆30Updated 4 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆54Updated 2 years ago
- Execute code using Azure Automation service without getting charged☆143Updated last year
- Bitcoin Randstorm Exploit - Very Fast Private Key and Address Generator☆75Updated last year
- Interactive shell to execute commands anonymously using Proxychains and Tor☆43Updated 2 years ago
- Command line interface to interact with hashes.com escrow service.☆38Updated 2 months ago
- Rubber Ducky powered by NeoKey☆27Updated last year
- Gadget IoC removal from HAK5's BashBunny☆20Updated 2 years ago
- IP2Tor allows to determine whether an IP address is a Tor exit node.☆30Updated 5 years ago
- Ded Security Framework is a tool aimed at security professionals☆36Updated last year
- A non-exhaustive list of hacktools related to EMV fraud☆61Updated 4 years ago
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆17Updated 3 years ago
- bitdrain - remote p2p bandwidth/cpu overage attack against bitcoin, dogecoin, etc.☆38Updated last year
- A Simple Script For SSH BruteForce☆37Updated 2 years ago
- ☆18Updated 2 years ago
- Official python agent for using the distributed hashcracker Hashtopolis☆77Updated this week
- This is a phishing ready platform. Unlike other phishing methods, EvilnoVNC allows you to bypass 2FA using a real browser via noVNC conn…☆10Updated 2 years ago
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆108Updated 2 years ago
- Discord bot for the Shodan API - OSINT tool☆78Updated last year
- Legba recipes.☆49Updated last year
- Python3 script to dump breach data from Dehashed☆33Updated 3 months ago
- MetaHarvest - is designed to extract rich, structured metadata from any given list of websites. It taps into web page contents to retriev…☆20Updated 3 weeks ago
- Collection Of LolSec☆37Updated 6 years ago
- We have compiled an exhaustive list of cryptocurrency exchange hacks [ 2011 – 2022 ] – you will be amazed at how much has been stolen ove…☆12Updated 2 years ago
- 🗺 A map of OSINT tools.☆19Updated 2 years ago
- Hacking the Singularity. Deep learning hacking. Weaponizing AI in Offensive security☆103Updated last year
- Basics on commands/tools/info on how to do binary exploitation on a mobile phone☆56Updated 2 years ago
- Capture screenshots of onion services on an onion service.☆71Updated last year
- Anubis 7.0☆27Updated last year