ZenGo-X / big-spenderLinks
A tool for checking BigSpender vulnerability in your Bitcoin wallet
☆39Updated 4 years ago
Alternatives and similar repositories for big-spender
Users that are interested in big-spender are comparing it to the libraries listed below
Sorting:
- Recover the private key from signed DSA messages. (multiple signed messages, static coefficient 'k')☆38Updated 7 years ago
- Store your crypto wallet seed phrase securely & publicly in a tattoo☆22Updated last month
- Basic Block-chain + mining concept using python☆12Updated 5 years ago
- An RPC attack framework for Blockchain nodes.☆95Updated 2 years ago
- ☆110Updated 2 years ago
- A Blockchain And Smart Contract Based CTF☆16Updated 2 years ago
- Finding Ethereum nodes which are vulnerable to RPC-attacks☆31Updated 9 years ago
- Ethereum Bug Bounty Submission: Sending Negative Value Transactions☆18Updated 3 years ago
- ECDSA nonce-reuse attack to recover a private key.☆50Updated 4 years ago
- ☆36Updated 10 years ago
- bitcoin replace-by-fee double spend tool☆26Updated 10 years ago
- Brute force BIP-39 Mnemonic using CPU☆128Updated 5 years ago
- A library for peer discovery inside the Tor network☆28Updated last year
- ☆27Updated 5 years ago
- Proof of concept of bitcoin private key recovery using weak ECDSA signatures☆75Updated last year
- A Proof of Concept to show how blockchain can solve C2C persistence. PoC originally presented at EuskalHack Security Congress 2017, updat…☆21Updated 7 years ago
- Bitcoin and Zcash wallets made simple - Javascript implementation of BIP 32 Bitcoin hierarchical deterministic keys☆22Updated 6 years ago
- Decrypts and displays the seed mnemonic from from a bitcoinj-based HD wallet file.☆45Updated 3 years ago
- A list of bitcoin addresses being used in Ransomware and Sextortion Scams☆16Updated 4 years ago
- This is a bitcoin mnemonic generator and WIF converter. It is based on the BIP-0039. It generates 12 mnemonic word list, which can be use…☆12Updated 2 years ago
- Breaking ECDSA (not so broken) with LLL☆85Updated last month
- Blockchain Security Tools and Techniques - A Deep Dive to Virtual Machines, Vulnerability Assessments, Penetration Testing, Audit Tools e…☆32Updated last year
- Search and extract blob files on the Ethereum Blockchain network☆45Updated 4 years ago
- A curated list of blockchain security incidents including exchange hacks, DeFi compromises, blockchain attacks, and others.☆25Updated 4 years ago
- Paper Wallet is the safest way to store your seed phrase and private keys.☆31Updated last year
- crawl QR-codes from search engines and look for bitcoin private keys☆74Updated 3 weeks ago
- Python module that generate private key, public key and wallet address from number☆23Updated 5 years ago
- A collection of scripts to steal BTC from Lightning Network enabled custodial services. Only for educational purpose! Share your findings…☆17Updated 4 years ago
- ❄️ Find all used addresses in your Bitcoin HD wallets bypassing gap limits.☆35Updated 2 years ago
- ☆24Updated 6 years ago