cyclone-github / metamask_pwnLinks
Tools to recover, extract and decrypt metamask wallets
☆19Updated this week
Alternatives and similar repositories for metamask_pwn
Users that are interested in metamask_pwn are comparing it to the libraries listed below
Sorting:
- Custom hashcat kernel for new Metamask Vaults☆18Updated 8 months ago
- Slides and videos from talks given at cons☆25Updated 4 months ago
- Tools to recover, extract and decrypt Phantom wallets☆24Updated 2 weeks ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆19Updated 2 years ago
- Tool to extract metamask vault hash☆11Updated last year
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Updated last year
- Top hashpwn rules☆21Updated 11 months ago
- ☆21Updated 6 months ago
- ☆13Updated 2 years ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Updated 5 years ago
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆26Updated 2 years ago
- Some useful scripts for CobaltStrike☆11Updated 6 years ago
- Public repo of some woking evilginx phishlets☆38Updated last year
- an Improoved Version of 0xNinjaCyclone´s EarlyCascade Code☆21Updated 8 months ago
- CVE-2013-4786 Go exploitation tool☆39Updated 2 years ago
- Parent Process ID Spoofing, coded in CGo.☆23Updated 6 months ago
- ☆17Updated last year
- A simple Nim stager (w/ fiber execution)☆19Updated 3 years ago
- ECC Public Key Cryptography☆38Updated 2 years ago
- ☆28Updated 2 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆55Updated 2 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 3 years ago
- Malware development in Go, learn today, anti dynamic analysis & Static & sandboxes.☆13Updated 6 months ago
- PhantomsGate: Advanced Shellcode Injection Technique☆25Updated last year
- API hooking and code injection made easy!☆40Updated 2 years ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Updated 2 years ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated last year
- Sample configuration to include as an Asterisk configuration to supplement automated caller ID spoofing capabilities.☆27Updated 5 years ago
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆11Updated 6 months ago
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆64Updated 11 months ago