Tools to recover, extract and decrypt Atomic wallets
☆13Dec 12, 2025Updated 2 months ago
Alternatives and similar repositories for atomic_pwn
Users that are interested in atomic_pwn are comparing it to the libraries listed below
Sorting:
- Custom hashcat kernel for new Metamask Vaults☆18Dec 12, 2025Updated 2 months ago
- Tools to recover, extract and decrypt metamask wallets☆23Feb 10, 2026Updated 2 weeks ago
- Tools to recover, extract and decrypt Phantom wallets☆31Feb 10, 2026Updated 2 weeks ago
- Spider - web crawler and local wordlist processor to generate frequency sorted wordlist / ngrams☆28Dec 16, 2025Updated 2 months ago
- API tool for hashes.com escrow☆12Dec 13, 2025Updated 2 months ago
- Slides and material from my conference presentations☆16Mar 30, 2024Updated last year
- 🌐 Flash USDT | For deposits to exchangers, wallets and exchanges.☆20Jan 8, 2025Updated last year
- ☆10Jan 8, 2018Updated 8 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- Haschcat Rules processor☆14Mar 22, 2023Updated 2 years ago
- Updated version of n0kovo's Rule List☆45Jan 29, 2026Updated last month
- ☆14Sep 22, 2024Updated last year
- Highly parallel, GPU-accelerated hybrid mergesort with mmap'd IO☆45Feb 21, 2019Updated 7 years ago
- JavaScript source map parser and extractor written in Python☆24Aug 6, 2019Updated 6 years ago
- A Windows desktop application to check cryptocurrency balances across multiple blockchain networks effortlessly. Supports Bitcoin, Ethere…☆20Oct 3, 2025Updated 4 months ago
- This aims to be a collection of tools to forensically analyze Active Directory databases☆25Jun 11, 2025Updated 8 months ago
- Burp Suite extension for API security testing with 15 attack types, 108+ payloads, intelligent fuzzing, BOLA/IDOR detection, AI integrati…☆48Dec 30, 2025Updated 2 months ago
- A python tool that scans files in a given directory looking for Bitcoin private keys☆21Dec 6, 2025Updated 2 months ago
- Python port of Pipal for password analytics☆22Oct 3, 2023Updated 2 years ago
- ☆26Jul 17, 2024Updated last year
- A wordlist-based encryption key brute forcer targeting weak key choice/derivation☆26Nov 21, 2018Updated 7 years ago
- Decode Hashcat '$HEX[]' password output from a password list containing a mixture of non-encoded and encoded passwords☆24Mar 1, 2019Updated 6 years ago
- 🚀 To step up in Quantum Computing, Here is a toolkit implementing fundamental quantum algorithms using IBM's Qiskit framework. Features …☆13Jan 6, 2025Updated last year
- Exodus and Atomic crypto wallets app.asar injection POC (captures mnemonic and password) for educational purposes only.☆26Jul 3, 2024Updated last year
- ☆37Sep 29, 2020Updated 5 years ago
- Linux install and network setup for SNAPS☆14Sep 7, 2019Updated 6 years ago
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆36Nov 25, 2025Updated 3 months ago
- ☆30Jun 22, 2020Updated 5 years ago
- The project for hacking your crypto wallet☆24Feb 2, 2024Updated 2 years ago
- Create n-grams of wordlists based on words, characters, or charsets to use in offline password attacks and data analysis☆34Jun 27, 2024Updated last year
- A new web frontend for Hashtopolis☆41Feb 20, 2026Updated last week
- Coin Flasher is a software designed for USDT flashing, available for all devices in apk, ios, windows, linux and mac installers.☆19Apr 9, 2025Updated 10 months ago
- silent crypto miner Free Crypto Miner Builder - Supports ETC, RVN, XMR, RTM and much more. miner crypto miner 2024 best miner miner btc m…☆11May 7, 2024Updated last year
- An archive of descrypt hashes for common non-personal passwords☆43Jun 28, 2025Updated 7 months ago
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆36May 21, 2018Updated 7 years ago
- Create database files for the genealogytree LaTeX package from GEDCOM files☆11Mar 11, 2025Updated 11 months ago
- OTP Grabber Bot | OTP Bot☆37Jul 11, 2025Updated 7 months ago
- Scripts to clone CA certificates for use in HTTPS client attacks.☆35Mar 26, 2020Updated 5 years ago
- hashgen - the blazingly fast hash generator☆40Feb 10, 2026Updated 2 weeks ago