ZenGo-X / big-spenderLinks
A tool for checking BigSpender vulnerability in your Bitcoin wallet
☆38Updated 4 years ago
Alternatives and similar repositories for big-spender
Users that are interested in big-spender are comparing it to the libraries listed below
Sorting:
- Recover the private key from signed DSA messages. (multiple signed messages, static coefficient 'k')☆39Updated 7 years ago
- An RPC attack framework for Blockchain nodes.☆95Updated 2 years ago
- ☆114Updated 2 years ago
- Store your crypto wallet seed phrase securely & publicly in a tattoo☆22Updated 5 months ago
- Ethereum Bug Bounty Submission: Sending Negative Value Transactions☆19Updated 3 years ago
- Proof of concept of bitcoin private key recovery using weak ECDSA signatures☆77Updated 2 years ago
- A collection of scripts to steal BTC from Lightning Network enabled custodial services. Only for educational purpose! Share your findings…☆17Updated 4 years ago
- Unified interface to work with cryptocurrency wallet.dat, .wallet, .key files. Can automatically attempt to figure out what type of coin …☆29Updated 3 years ago
- Brute force BIP-39 Mnemonic using CPU☆134Updated 5 years ago
- ECDSA nonce-reuse attack to recover a private key.☆50Updated 5 years ago
- Broadcasting Transactions into the Bitcoin Network.☆12Updated 3 months ago
- Finding Ethereum nodes which are vulnerable to RPC-attacks☆31Updated 9 years ago
- Breaking ECDSA (not so broken) with LLL☆90Updated 2 months ago
- Decrypts and displays the seed mnemonic from from a bitcoinj-based HD wallet file.☆45Updated 4 years ago
- A Blockchain And Smart Contract Based CTF☆17Updated 2 years ago
- Create vanity ethereum addresses like 0xda66666666c3a809ADA79D93114a3662073cC0 through brute force. Also has the ability to load a dictio…☆22Updated 2 years ago
- Artifacts for the "Minerva: The curse of ECDSA nonces" paper at CHES 2020☆32Updated 3 years ago
- bitcoin replace-by-fee double spend tool☆26Updated 10 years ago
- Bitcoin and Zcash wallets made simple - Javascript implementation of BIP 32 Bitcoin hierarchical deterministic keys☆22Updated 6 years ago
- Exploiting ECDSA Failures in the Bitcoin Blockchain☆64Updated 11 years ago
- A simple library to recover the private key of ECDSA and DSA signatures sharing the same nonce k and therefore having identical signature…☆423Updated 3 years ago
- This is a bitcoin mnemonic generator and WIF converter. It is based on the BIP-0039. It generates 12 mnemonic word list, which can be use…☆15Updated 2 years ago
- Vanitygen plus plus for VS2019 - ported for Microsoft Windows 10, VS2019 and NVIDIA CUDA SDK. It is a vanity address generator for ALC, B…☆51Updated 3 years ago
- A list of bitcoin addresses being used in Ransomware and Sextortion Scams☆17Updated 4 years ago
- Basic Block-chain + mining concept using python☆13Updated 5 years ago
- Tools for computing Elliptic Curve interval discrete logarithms using Pollard's lambda algorithm☆25Updated 5 years ago
- ☆37Updated 10 years ago
- Tool for computing elliptic curve (EC) discrete logarithms☆37Updated 8 years ago
- ☆25Updated 7 years ago
- rnn/lstm to generate private keys from public keys of known high value☆39Updated 4 years ago