ZenGo-X / big-spender
A tool for checking BigSpender vulnerability in your Bitcoin wallet
☆40Updated 4 years ago
Alternatives and similar repositories for big-spender
Users that are interested in big-spender are comparing it to the libraries listed below
Sorting:
- Recover the private key from signed DSA messages. (multiple signed messages, static coefficient 'k')☆38Updated 7 years ago
- ECDSA nonce-reuse attack to recover a private key.☆49Updated 4 years ago
- Proof of concept of bitcoin private key recovery using weak ECDSA signatures☆75Updated last year
- Finding Ethereum nodes which are vulnerable to RPC-attacks☆33Updated 8 years ago
- A collection of scripts to steal BTC from Lightning Network enabled custodial services. Only for educational purpose! Share your findings…☆18Updated 3 years ago
- bitcoin replace-by-fee double spend tool☆26Updated 9 years ago
- Elliptic curve tools, ECDSA, and ECDSA attacks.☆9Updated 5 years ago
- Unified interface to work with cryptocurrency wallet.dat, .wallet, .key files. Can automatically attempt to figure out what type of coin …☆28Updated 3 years ago
- Sometimes Ethereum nodes are vulnerable to a JSON-RPC exploit - this is a handful of scripts to secure those funds.☆8Updated 6 years ago
- rnn/lstm to generate private keys from public keys of known high value☆36Updated 3 years ago
- Ethereum Bug Bounty Submission: Sending Negative Value Transactions☆18Updated 3 years ago
- SX Flash Loans ⚡️ Borrow any amount of liquidity instantly for near-zero fees & no collateral.☆13Updated 3 years ago
- Broadcasting Transactions into the Bitcoin Network.☆10Updated 6 months ago
- ☆102Updated last year
- A small tool to bruteforce weak ethereum private keys and more☆12Updated 6 years ago
- A Blockchain And Smart Contract Based CTF☆16Updated last year
- ethereum wallet recovery password multithread tool, baked from pyethrecover and pyethereum, for using keystore v3 json file to help recov…☆48Updated 3 years ago
- ☆27Updated 5 years ago
- Convert Ethereum mnemonic keys into private keys that can be consumed by regular wallets☆68Updated 3 years ago
- ☆24Updated 6 years ago
- send me some eth, how bout dat?☆11Updated 6 years ago
- PoC implementation of Gallois Field, Paillier, DSA, ECDSA, and curve secp256k1 with an adapted scheme of "Two-party generation of DSA si…☆13Updated 7 years ago
- C Program to generate 12 word phrases for Bip39 and use with brainflayer☆14Updated 6 years ago
- Algorithms to re-compute a private key, to fake signatures and some other funny things with Bitcoin.☆107Updated 4 years ago
- Store your crypto wallet seed phrase securely & publicly in a tattoo☆22Updated 3 years ago
- A simple single page application for displaying many crypto currency accounts using bip39 HD key seed phrases.☆50Updated 3 years ago
- ❄️ Find all used addresses in your Bitcoin HD wallets bypassing gap limits.☆33Updated 2 years ago
- Blockchain Attack Vectors & Vulnerabilities to Smart Contracts☆27Updated 2 years ago
- Create vanity ethereum addresses like 0xda66666666c3a809ADA79D93114a3662073cC0 through brute force. Also has the ability to load a dictio…☆22Updated 2 years ago
- Bitcoin and Zcash wallets made simple - Javascript implementation of BIP 32 Bitcoin hierarchical deterministic keys☆22Updated 5 years ago