cyclone-github / metamask_pwn
Tools to recover, extract and decrypt metamask wallets
☆17Updated last week
Alternatives and similar repositories for metamask_pwn:
Users that are interested in metamask_pwn are comparing it to the libraries listed below
- Tools to recover, extract and decrypt Phantom wallets☆23Updated last week
- Custom hashcat kernel for new Metamask Vaults☆11Updated 2 months ago
- Fast scanner for exposed env files☆11Updated 2 years ago
- ExplorerUACStealer it's a malware that steal credentials provided by users in UAC Auth in explorer using API Hooking with Detours in C++…☆15Updated last year
- An 💦 orgasmic 💦 Python library for the Docker Engine API 🥵☆13Updated last year
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆16Updated 2 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆52Updated last year
- Some useful scripts for CobaltStrike☆10Updated 6 years ago
- Use onion scan to detect the dark net web service, This Repo Contained Recently Scan Results☆11Updated 6 years ago
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆27Updated last year
- ECC Public Key Cryptography☆37Updated last year
- Legba recipes.☆49Updated 8 months ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆18Updated last year
- Rust-based password mutator for brute force attacks☆13Updated last month
- Top hashpwn rules☆19Updated 5 months ago
- Phishing Reverse Proxy with MFA bypass☆17Updated 2 years ago
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆21Updated last year
- If you still know the password and have Metamask's data files, you may be able to recover your wallet seed and imported private keys.☆22Updated last year
- Fuzz Network Traffic☆18Updated 3 months ago
- Rust procedural macro to insert a few asm! calls full of junk instructions in between every line of code.☆13Updated last year
- Database for custom made as well as publicly available stage-2 or beacons or stageless payloads, used by loaders/stage-1/stagers, or for …☆10Updated 2 months ago
- A slightly more fun way to disable windows defender☆25Updated this week
- bitdrain - remote p2p bandwidth/cpu overage attack against bitcoin, dogecoin, etc.☆39Updated 11 months ago
- Shadow Strike is a hacking framework that aids in information gathering, payload generation, payload delivery, and website exploitation.☆8Updated 4 years ago
- another pwndb tool with more options☆15Updated 4 years ago
- Malkom is an extensible and simple similarity graph generator for malware analysis aimed at helping analysts visualize and cluster sets o…☆16Updated 2 years ago
- rpv-web is a browser based frontend for the rpv library☆25Updated 2 weeks ago
- Slides and videos from talks given at cons☆13Updated 9 months ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆16Updated 3 years ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 9 months ago