cyclone-github / metamask_pwnLinks
Tools to recover, extract and decrypt metamask wallets
☆20Updated 3 months ago
Alternatives and similar repositories for metamask_pwn
Users that are interested in metamask_pwn are comparing it to the libraries listed below
Sorting:
- Custom hashcat kernel for new Metamask Vaults☆18Updated 5 months ago
- Tools to recover, extract and decrypt Phantom wallets☆24Updated 3 months ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆18Updated 2 years ago
- ECC Public Key Cryptography☆39Updated last year
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Updated last year
- Self replicating and automatically spreading SSH worm that recovers login credentials☆52Updated last year
- Public repo of some woking evilginx phishlets☆37Updated 9 months ago
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆27Updated last year
- Tool to extract metamask vault hash☆11Updated 9 months ago
- Python3 tool to perform password spraying using RDP☆17Updated last year
- ☆19Updated 3 months ago
- Parent Process ID Spoofing, coded in CGo.☆23Updated 3 months ago
- Custom Evilginx2 Docker container without any IOCs or Evilginx Eggs..☆13Updated 3 years ago
- IVRE's fork of the famous TCP port scanner. See below for details.☆40Updated 6 months ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆30Updated last month
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆32Updated last year
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆11Updated 3 months ago
- Top hashpwn rules☆20Updated 8 months ago
- PhantomsGate: Advanced Shellcode Injection Technique☆23Updated last year
- A C# Tool to gather information about email breaches☆15Updated last year
- powershell script i wrote that can suspend an arbitrary process (with limits)☆20Updated 2 years ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Updated 5 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Updated 2 years ago
- Slides and videos from talks given at cons☆24Updated last month
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆22Updated last year
- ☆16Updated last year
- A mechanism that trampoline hooks functions in x86/x64 systems.☆22Updated 10 months ago
- A simple Nim stager (w/ fiber execution)☆18Updated 3 years ago
- Sample configuration to include as an Asterisk configuration to supplement automated caller ID spoofing capabilities.☆27Updated 4 years ago