Tool to extract metamask vault hash
☆12Nov 3, 2024Updated last year
Alternatives and similar repositories for metamask_extractor
Users that are interested in metamask_extractor are comparing it to the libraries listed below
Sorting:
- Custom hashcat kernel for new Metamask Vaults☆18Dec 12, 2025Updated 2 months ago
- API tool for hashes.com escrow☆12Dec 13, 2025Updated 2 months ago
- Top hashpwn rules☆21Dec 12, 2025Updated 2 months ago
- Spider - web crawler and local wordlist processor to generate frequency sorted wordlist / ngrams☆28Dec 16, 2025Updated 2 months ago
- Scripts by cyclone to automate tasks☆24Dec 12, 2025Updated 2 months ago
- Tools to recover, extract and decrypt metamask wallets☆23Feb 10, 2026Updated 2 weeks ago
- Reduce Dynamic Analysis Detection Rates With Built-In Unhooker, Anti Analysis Techniques, And String Obfuscator Modules.☆21Dec 21, 2022Updated 3 years ago
- ☆14Sep 8, 2024Updated last year
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆30Sep 15, 2025Updated 5 months ago
- hashgen - the blazingly fast hash generator☆40Feb 10, 2026Updated 2 weeks ago
- Custom rules by cyclone☆16Dec 12, 2025Updated 2 months ago
- Command line interface to interact with hashes.com escrow service.☆44Feb 10, 2026Updated 2 weeks ago
- RLI Next Gen (Rling), a faster multi-threaded, feature rich alternative to rli found in hashcat utilities.☆94Updated this week
- Tools to recover, extract and decrypt Phantom wallets☆31Feb 10, 2026Updated 2 weeks ago
- 🚀 To step up in Quantum Computing, Here is a toolkit implementing fundamental quantum algorithms using IBM's Qiskit framework. Features …☆13Jan 6, 2025Updated last year
- ☆37Sep 29, 2020Updated 5 years ago
- Various wordlists☆72Dec 12, 2025Updated 2 months ago
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆36Nov 25, 2025Updated 3 months ago
- A log4shell detector using ProGuardCORE☆10Aug 5, 2022Updated 3 years ago
- ☆12Feb 4, 2025Updated last year
- Updated version of n0kovo's Rule List☆45Jan 29, 2026Updated last month
- A Windows kernel driver unit testing framework. Provides a macro free modern cpp syntax. Includes tools for automatic running on your vm.☆11May 15, 2023Updated 2 years ago
- A simple DNS exfiltration script☆11Apr 17, 2023Updated 2 years ago
- Encrypt, decrypt, and break caesar's cipher.☆10Jun 18, 2021Updated 4 years ago
- This is a PoC using native windows API directx, to hide and decrypt shellcode via compute shader☆10May 3, 2025Updated 9 months ago
- Minimalist python library to interact with antelope blockchains☆12Mar 17, 2025Updated 11 months ago
- As I work thought the book "Practical Binary Analysis" by Dennis Andriesse, https://practicalbinaryanalysis.com/ I try to make editions f…☆11Sep 28, 2021Updated 4 years ago
- Simple C++ Reverse Shell☆13Nov 22, 2022Updated 3 years ago
- An emulator of Schwarz☆10Feb 18, 2018Updated 8 years ago
- Cracking PDF password protection via hashcat.☆14Dec 24, 2025Updated 2 months ago
- A controlled environment for demonstrating and understanding buffer overflow vulnerabilities in web applications. This project is designe…☆25Jan 27, 2025Updated last year
- A Python script to scan EVM-based blockchains for smart contract upgrades☆10Jul 27, 2023Updated 2 years ago
- Various shellcodes☆12Sep 1, 2020Updated 5 years ago
- Streamlines the creation of dataset to train a Large Language Model with triplets : instruction-input-output . The default configuration …☆13Apr 17, 2023Updated 2 years ago
- Threat Hijacking Simple Implementation☆18Feb 24, 2025Updated last year
- A step-by-step walkthrough of how to write a Client and a Driver to communicate with each other and boost the priority of a thread.☆17Dec 12, 2023Updated 2 years ago
- Spawn SYSTEM shells like a PRO!☆10Mar 8, 2023Updated 2 years ago
- Hands-on experiments to demonstrate the exploitability of insecure TLS configurations in Android apps☆15Jan 18, 2022Updated 4 years ago
- ☆14Jul 8, 2023Updated 2 years ago