cyclone-github / metamask_pwn
Tools to recover, extract and decrypt metamask wallets
☆17Updated 2 months ago
Alternatives and similar repositories for metamask_pwn:
Users that are interested in metamask_pwn are comparing it to the libraries listed below
- Custom hashcat kernel for new Metamask Vaults☆10Updated last month
- Tools to recover, extract and decrypt Phantom wallets☆22Updated last month
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆18Updated last year
- Self replicating and automatically spreading SSH worm that recovers login credentials☆51Updated last year
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆20Updated last year
- ExplorerUACStealer it's a malware that steal credentials provided by users in UAC Auth in explorer using API Hooking with Detours in C++…☆15Updated last year
- Top hashpwn rules☆18Updated 4 months ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆16Updated 2 years ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆20Updated last year
- Fast scanner for exposed env files☆11Updated 2 years ago
- Slides and videos from talks given at cons☆13Updated 9 months ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- IVRE's fork of the famous TCP port scanner. See below for details.☆40Updated 2 months ago
- ☆9Updated 4 months ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆16Updated 3 years ago
- ☆14Updated 3 years ago
- x86_64 LKM linux rootkit☆16Updated last year
- Password Transformation Tool (ptt) is a versatile utility designed for password cracking.☆27Updated 3 weeks ago
- ☆16Updated last month
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆26Updated 6 months ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆15Updated 3 years ago
- Modular C2 server to tame your pack of wolves☆12Updated last year
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Updated last year
- The utility aims to clean up output generated by popular tools by calculating a hash based on specific JSON values to removing junk data.☆13Updated 11 months ago
- ECC Public Key Cryptography☆37Updated last year
- A tool for creating bitcoin stealing phishing clones of onion services on large scale☆31Updated last year
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 8 months ago
- LSASS Credential Dumper that utilizes the Windows API, in-memory RC4 encryption and Base64 encoding, and HTTPS exfiltration.☆10Updated last year
- ☆18Updated 4 months ago
- Firefox webInjector capable of injecting codes into webpages using a mitmproxy.☆40Updated 2 years ago