cyclone-github / hashcat_26620_kernelLinks
Custom hashcat kernel for new Metamask Vaults
☆19Updated last month
Alternatives and similar repositories for hashcat_26620_kernel
Users that are interested in hashcat_26620_kernel are comparing it to the libraries listed below
Sorting:
- Tools to recover, extract and decrypt Atomic wallets☆12Updated last month
- Tools to recover, extract and decrypt metamask wallets☆23Updated 2 weeks ago
- Tool to extract metamask vault hash☆12Updated last year
- Custom rules by cyclone☆16Updated last month
- Self replicating and automatically spreading SSH worm that recovers login credentials☆55Updated 2 years ago
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆59Updated 9 months ago
- Phishing Reverse Proxy with MFA bypass☆17Updated 3 years ago
- IVRE's fork of the famous TCP port scanner. See below for details.☆39Updated last year
- Antivirus Signature Search Toolkit☆81Updated 2 years ago
- Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.☆28Updated 9 months ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Updated last year
- Slides and videos from talks given at cons☆25Updated 7 months ago
- PackageSpy is a versatile command-line tool designed to simplify the process of searching for packages on two popular package managers☆22Updated last year
- Security and Hacking Tools, Exploits, Proof of Concepts, Shellcodes, Scripts.☆65Updated 3 weeks ago
- hiding in plain sight: part 2☆44Updated last year
- Ransomware written in go, encrypt - decrypt.☆29Updated 9 months ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆19Updated 2 years ago
- ☆17Updated 6 years ago
- Parent Process ID Spoofing, coded in CGo.☆24Updated 9 months ago
- Quickly look up hashes in your terminal using the HashMob API 🔥☆13Updated 2 years ago
- A simple script to obfuscate batch(bat) code easily☆25Updated 2 years ago
- Command line interface to interact with hashes.com escrow service.☆44Updated last month
- masscan with exclusive excludes☆58Updated 2 years ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆48Updated last year
- ☆12Updated 2 years ago
- CHAOS RAT web panel path RCE PoC☆30Updated last year
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆21Updated 3 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆65Updated last year
- BoltWire v6.03 vulnerable to "Improper Access Control"☆13Updated 2 years ago
- A Ruby micro-framework for writing and running exploit payloads☆23Updated 2 weeks ago