ValtteriL / OnionFermenter
A tool for creating bitcoin stealing phishing clones of onion services on large scale
☆32Updated last year
Alternatives and similar repositories for OnionFermenter
Users that are interested in OnionFermenter are comparing it to the libraries listed below
Sorting:
- bitdrain - remote p2p bandwidth/cpu overage attack against bitcoin, dogecoin, etc.☆39Updated 11 months ago
- ☆13Updated 2 years ago
- Tools to recover, extract and decrypt metamask wallets☆18Updated last month
- Replace any BTC, XMR, XLM, ETH, XRP, LTC, BCH, NEC, ZCASH, DASH, DOGE, WMR, WMG, WMX, Yandex money, Qiwi address to yours☆30Updated 4 years ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆18Updated last year
- Shadow Strike is a hacking framework that aids in information gathering, payload generation, payload delivery, and website exploitation.☆8Updated 4 years ago
- This is a phishing ready platform. Unlike other phishing methods, EvilnoVNC allows you to bypass 2FA using a real browser via noVNC conn…☆11Updated 2 years ago
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆26Updated 6 years ago
- Bitcoin Randstorm Exploit - Very Fast Private Key and Address Generator☆67Updated last year
- Proof-Of-Concept SSH Worm. Not for illegal use.☆14Updated 7 years ago
- Modular framework to exploit UPS devices☆63Updated 2 years ago
- Scrape Pastebin API to collect daily pastes, setup a wordlist and be alerted by email when you have a match.☆49Updated 3 months ago
- fully Undetectable payload generator for metasploit☆11Updated 2 years ago
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- Gadget IoC removal from HAK5's BashBunny☆19Updated last year
- Self replicating and automatically spreading SSH worm that recovers login credentials☆52Updated last year
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆14Updated 2 years ago
- ☆28Updated last year
- A number of exploits and tools I've written for CVEs accredited to Marshall Whittaker/oxagast☆7Updated 2 weeks ago
- Facial Recognition and its dangers for Special Forces Operatives☆24Updated last year
- masscan with exclusive excludes☆56Updated last year
- Repository of tools used in my blog☆51Updated last year
- Legba recipes.☆49Updated 8 months ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆18Updated last year
- FuzzSSH is a free software tool created to detect SSH (protocol) vulnerabilities.☆16Updated 3 years ago
- Bitcoin (BTC) Private key checker from 1M btc address with valid balance.☆25Updated last year
- We have compiled an exhaustive list of cryptocurrency exchange hacks [ 2011 – 2022 ] – you will be amazed at how much has been stolen ove…☆12Updated 2 years ago
- A simple Cryptojacking malware made with Go and XMRig, for educational purposes only.☆18Updated 5 years ago
- IVRE's fork of the famous TCP port scanner. See below for details.☆40Updated 3 months ago
- A collection of scripts to steal BTC from Lightning Network enabled custodial services. Only for educational purpose! Share your findings…☆18Updated 3 years ago