cyclone-github / metamask_pwnLinks
Tools to recover, extract and decrypt metamask wallets
☆19Updated last week
Alternatives and similar repositories for metamask_pwn
Users that are interested in metamask_pwn are comparing it to the libraries listed below
Sorting:
- Custom hashcat kernel for new Metamask Vaults☆18Updated 9 months ago
- Tools to recover, extract and decrypt Phantom wallets☆24Updated last week
- Slides and videos from talks given at cons☆25Updated 5 months ago
- ☆13Updated 2 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆20Updated 2 years ago
- ECC Public Key Cryptography☆38Updated 2 years ago
- An improved fork of NoPhish.☆13Updated 6 months ago
- ☆12Updated 9 months ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆54Updated 2 years ago
- Tool to extract metamask vault hash☆11Updated last year
- Hunting and injecting RWX 'mockingjay' DLLs in pure nim☆59Updated 11 months ago
- PhantomsGate: Advanced Shellcode Injection Technique☆25Updated last year
- ☆21Updated 6 months ago
- Public repo of some woking evilginx phishlets☆39Updated last year
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Updated last year
- A simple Nim stager (w/ fiber execution)☆19Updated 3 years ago
- Inject shellcode into a valid BMP/GIF image.☆32Updated 5 years ago
- Top hashpwn rules☆21Updated last year
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Updated 5 years ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Updated 2 years ago
- ☆17Updated last year
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆22Updated last year
- Firefox webInjector capable of injecting codes into webpages using a mitmproxy.☆42Updated 3 years ago
- Parent Process ID Spoofing, coded in CGo.☆23Updated 7 months ago
- A framework for backdooring Microsoft Nuget packages.☆10Updated last year
- single-threaded event driven sleep obfuscation poc for linux☆35Updated 5 months ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆45Updated 7 months ago
- Sample configuration to include as an Asterisk configuration to supplement automated caller ID spoofing capabilities.☆27Updated 5 years ago
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆11Updated 7 months ago
- Payload Dropper with Persistance & Privesc & UAC bypass 🐱👤☆13Updated last year