cyclone-github / metamask_pwn
Tools to recover, extract and decrypt metamask wallets
☆18Updated last month
Alternatives and similar repositories for metamask_pwn
Users that are interested in metamask_pwn are comparing it to the libraries listed below
Sorting:
- ☆13Updated 2 years ago
- Tools to recover, extract and decrypt Phantom wallets☆23Updated last month
- Custom hashcat kernel for new Metamask Vaults☆13Updated 3 months ago
- Top hashpwn rules☆19Updated 5 months ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆18Updated 2 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆16Updated 4 years ago
- Shadow Strike is a hacking framework that aids in information gathering, payload generation, payload delivery, and website exploitation.☆8Updated 4 years ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆16Updated 2 years ago
- An End to End Encrypted SMS and SMS Tunneling app☆40Updated 2 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆52Updated last year
- A tool for creating bitcoin stealing phishing clones of onion services on large scale☆32Updated last year
- ☆10Updated 6 months ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆18Updated last year
- ECC Public Key Cryptography☆37Updated last year
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 5 years ago
- Tool for obtaining information about PPL processes☆17Updated last year
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆22Updated last year
- HTTP based framework for building command and control components for remote access trojans☆14Updated 3 years ago
- Slides and videos from talks given at cons☆13Updated 10 months ago
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆12Updated 3 weeks ago
- Rust-based password mutator for brute force attacks☆13Updated last month
- Payload Dropper with Persistance & Privesc & UAC bypass 🐱👤☆13Updated last year
- IVRE's fork of the famous TCP port scanner. See below for details.☆40Updated 3 months ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Updated 3 years ago
- Database for custom made as well as publicly available stage-2 or beacons or stageless payloads, used by loaders/stage-1/stagers, or for …☆10Updated 3 months ago
- A framework for backdooring Microsoft Nuget packages.☆8Updated last year
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆24Updated 4 months ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Updated last year
- The utility aims to clean up output generated by popular tools by calculating a hash based on specific JSON values to removing junk data.☆13Updated last year
- Proof of concept exploit for Ivanti EPM CVE-2024-13159 and others☆11Updated 2 months ago