cyclone-github / metamask_pwnLinks
Tools to recover, extract and decrypt metamask wallets
☆20Updated this week
Alternatives and similar repositories for metamask_pwn
Users that are interested in metamask_pwn are comparing it to the libraries listed below
Sorting:
- Tools to recover, extract and decrypt Atomic wallets☆11Updated last week
- Custom hashcat kernel for new Metamask Vaults☆19Updated last week
- Tools to recover, extract and decrypt Phantom wallets☆26Updated this week
- ☆13Updated 2 years ago
- Slides and videos from talks given at cons☆25Updated 6 months ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Updated last year
- An improved fork of NoPhish.☆14Updated 7 months ago
- Network Traffic Fuzzer☆17Updated 11 months ago
- Rust procedural macro to insert a few asm! calls full of junk instructions in between every line of code.☆13Updated 2 years ago
- Attack tool for altering packed samples so that they evade static packing detection☆21Updated 10 months ago
- A simple Nim stager (w/ fiber execution)☆19Updated 3 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆20Updated 2 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆55Updated 2 years ago
- A cross-platform Nim implant for Prelude Operator☆31Updated 3 years ago
- A framework for backdooring Microsoft Nuget packages.☆10Updated last year
- HTTP based framework for building command and control components for remote access trojans☆15Updated 4 years ago
- An End to End Encrypted SMS and SMS Tunneling app☆41Updated 2 years ago
- Malware development in Go, learn today, anti dynamic analysis & Static & sandboxes.☆13Updated 7 months ago
- wh cyberspace☆12Updated 3 years ago
- MSFVenom Powershell Stager Encoder & Generator☆16Updated 4 years ago
- ECC Public Key Cryptography☆37Updated 2 years ago
- Parent Process ID Spoofing, coded in CGo.☆23Updated 7 months ago
- Python3 tool to perform password spraying using RDP☆16Updated 2 years ago
- A tool for creating bitcoin stealing phishing clones of onion services on large scale☆36Updated 2 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 4 years ago
- x86_64 LKM linux rootkit☆16Updated 2 years ago
- Configurable, Community driven, HTTP C2 Profile☆27Updated 6 months ago
- Generate representative samples from Pwned Passwords (HIBP)☆12Updated 3 years ago
- Phishing Reverse Proxy with MFA bypass☆17Updated 2 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆25Updated 3 years ago