cyclone-github / metamask_pwnLinks
Tools to recover, extract and decrypt metamask wallets
☆20Updated last week
Alternatives and similar repositories for metamask_pwn
Users that are interested in metamask_pwn are comparing it to the libraries listed below
Sorting:
- Tools to recover, extract and decrypt Atomic wallets☆11Updated 2 weeks ago
- Custom hashcat kernel for new Metamask Vaults☆19Updated 2 weeks ago
- ☆13Updated 2 years ago
- Tools to recover, extract and decrypt Phantom wallets☆26Updated last week
- Tool to extract metamask vault hash☆12Updated last year
- An analysis of the user password hashing algorithm used by Citrix NetScaler☆15Updated 3 months ago
- Slides and videos from talks given at cons☆25Updated 6 months ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆55Updated 2 years ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Updated last year
- A tool for creating bitcoin stealing phishing clones of onion services on large scale☆36Updated 2 years ago
- A simple Nim stager (w/ fiber execution)☆19Updated 3 years ago
- A cross-platform Nim implant for Prelude Operator☆31Updated 3 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 4 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆12Updated 3 years ago
- Quickly look up hashes in your terminal using the HashMob API 🔥☆13Updated 2 years ago
- Malware development in Go, learn today, anti dynamic analysis & Static & sandboxes.☆13Updated 8 months ago
- IVRE's fork of the famous TCP port scanner. See below for details.☆39Updated 10 months ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆20Updated 2 years ago
- Network Traffic Fuzzer☆17Updated 11 months ago
- Attack tool for altering packed samples so that they evade static packing detection☆21Updated 11 months ago
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆29Updated last year
- An improved fork of NoPhish.☆14Updated 7 months ago
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆11Updated 8 months ago
- Custom rules by cyclone☆15Updated 2 weeks ago
- Rust procedural macro to insert a few asm! calls full of junk instructions in between every line of code.☆13Updated 2 years ago
- Simple ransomware written in Rust. Part of the building a rustomware blog post.☆34Updated 2 years ago
- Legba recipes.☆51Updated last year
- Parent Process ID Spoofing, coded in CGo.☆23Updated 8 months ago
- Configurable, Community driven, HTTP C2 Profile☆27Updated 6 months ago
- ECC Public Key Cryptography☆37Updated 2 years ago