ZenGo-X / big-spenderLinks
A tool for checking BigSpender vulnerability in your Bitcoin wallet
☆40Updated 4 years ago
Alternatives and similar repositories for big-spender
Users that are interested in big-spender are comparing it to the libraries listed below
Sorting:
- ECDSA nonce-reuse attack to recover a private key.☆50Updated 4 years ago
- Recover the private key from signed DSA messages. (multiple signed messages, static coefficient 'k')☆38Updated 7 years ago
- ☆102Updated last year
- An RPC attack framework for Blockchain nodes.☆95Updated last year
- Unified interface to work with cryptocurrency wallet.dat, .wallet, .key files. Can automatically attempt to figure out what type of coin …☆28Updated 3 years ago
- A collection of scripts to steal BTC from Lightning Network enabled custodial services. Only for educational purpose! Share your findings…☆18Updated 3 years ago
- ☆27Updated 5 years ago
- Proof of concept of bitcoin private key recovery using weak ECDSA signatures☆77Updated last year
- Create vanity ethereum addresses like 0xda66666666c3a809ADA79D93114a3662073cC0 through brute force. Also has the ability to load a dictio…☆22Updated 2 years ago
- bitcoin replace-by-fee double spend tool☆26Updated 10 years ago
- Finding Ethereum nodes which are vulnerable to RPC-attacks☆32Updated 9 years ago
- Elliptic curve tools, ECDSA, and ECDSA attacks.☆9Updated 5 years ago
- Breaking ECDSA (not so broken) with LLL☆81Updated 2 months ago
- Broadcasting Transactions into the Bitcoin Network.☆9Updated 7 months ago
- Various shell scripts, mainly to be used together with Bitcoin Core (bitcoind or bitcoin-qt) wallet. Fake coinjoin, ricochet, poor man's …☆86Updated last year
- Ethereum Bug Bounty Submission: Breaking ecdsa that uses `privKey xor message` as nonce.☆31Updated 2 years ago
- A small tool to bruteforce weak ethereum private keys and more☆12Updated 6 years ago
- Python module for sending bitcoin transaction directly to the bitcoin network☆15Updated 12 years ago
- Basic Block-chain + mining concept using python☆13Updated 5 years ago
- Store your crypto wallet seed phrase securely & publicly in a tattoo☆22Updated 3 years ago
- ☆11Updated 4 years ago
- Ethereum Bug Bounty Submission: Sending Negative Value Transactions☆18Updated 3 years ago
- Sometimes Ethereum nodes are vulnerable to a JSON-RPC exploit - this is a handful of scripts to secure those funds.☆8Updated 6 years ago
- ☆26Updated 2 years ago
- Generate forged signatures for the Genesis block public key☆9Updated 6 years ago
- rnn/lstm to generate private keys from public keys of known high value☆38Updated 3 years ago
- ❄️ Find all used addresses in your Bitcoin HD wallets bypassing gap limits.☆33Updated 2 years ago
- Brute force BIP-39 Mnemonic using CPU☆129Updated 4 years ago
- Bitcoin and Zcash wallets made simple - Javascript implementation of BIP 32 Bitcoin hierarchical deterministic keys☆22Updated 6 years ago
- ☆24Updated 6 years ago