cyclone-github / metamask_pwnLinks
Tools to recover, extract and decrypt metamask wallets
☆22Updated last week
Alternatives and similar repositories for metamask_pwn
Users that are interested in metamask_pwn are comparing it to the libraries listed below
Sorting:
- Tools to recover, extract and decrypt Atomic wallets☆12Updated last month
- Custom hashcat kernel for new Metamask Vaults☆19Updated last month
- Tools to recover, extract and decrypt Phantom wallets☆29Updated last week
- ☆12Updated 2 years ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Updated last year
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆19Updated 2 years ago
- Tool to extract metamask vault hash☆12Updated last year
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 4 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆55Updated 2 years ago
- Slides and videos from talks given at cons☆25Updated 7 months ago
- Phishing Reverse Proxy with MFA bypass☆17Updated 2 years ago
- Inject shellcode into a valid BMP/GIF image.☆32Updated 5 years ago
- Firefox webInjector capable of injecting codes into webpages using a mitmproxy.☆42Updated 3 years ago
- Prometheus Service Discovery for Tailscale (Python Edition)☆26Updated 3 years ago
- A payload delivery system which embeds payloads in an executable's icon file!☆74Updated last year
- x86_64 LKM linux rootkit☆16Updated 2 years ago
- Simple ransomware written in Rust. Part of the building a rustomware blog post.☆35Updated 2 years ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Updated 2 years ago
- PAM Backdoor☆32Updated 2 years ago
- An interactive mock C2 server☆17Updated 2 years ago
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆30Updated last year
- Network Traffic Fuzzer☆17Updated last year
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆26Updated 2 years ago
- A 2-in-1 toolset of https://github.com/x0rz/EQGRP_Lost_in_Translation and https://github.com/x0rz/EQGRP☆27Updated 6 years ago
- Lateralus is terminal based phishing campaign tool☆27Updated 2 years ago
- A utility that can be used to launch an executable with a DLL injected☆19Updated 2 years ago
- GoLang package for creating Mythic Payload Types, C2 Profiles, Translation Services, WebHook listeners, and Loggers☆23Updated last month
- Malware development in Go, learn today, anti dynamic analysis & Static & sandboxes.☆15Updated 9 months ago
- HTTP based framework for building command and control components for remote access trojans☆15Updated 4 years ago
- ECC Public Key Cryptography☆37Updated 2 years ago