cyclone-github / metamask_pwnLinks
Tools to recover, extract and decrypt metamask wallets
☆19Updated 2 months ago
Alternatives and similar repositories for metamask_pwn
Users that are interested in metamask_pwn are comparing it to the libraries listed below
Sorting:
- Custom hashcat kernel for new Metamask Vaults☆17Updated 4 months ago
- ☆13Updated 2 years ago
- Tools to recover, extract and decrypt Phantom wallets☆24Updated 2 months ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆18Updated 2 years ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Updated last year
- ECC Public Key Cryptography☆38Updated last year
- HTTP based framework for building command and control components for remote access trojans☆15Updated 3 years ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 4 years ago
- ☆15Updated 2 years ago
- Fast scanner for exposed env files☆12Updated 2 years ago
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆22Updated last year
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆16Updated 4 years ago
- Phishing Reverse Proxy with MFA bypass☆17Updated 2 years ago
- Tool to extract metamask vault hash☆11Updated 7 months ago
- A Documentation for my module PS2BAT, it converts Powershell Scripts to Batchfile ones.☆11Updated 2 months ago
- Parent Process ID Spoofing, coded in CGo.☆22Updated 2 months ago
- A simple Nim stager (w/ fiber execution)☆18Updated 3 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆52Updated last year
- Top hashpwn rules☆19Updated 7 months ago
- Simple reverse ICMP shell☆14Updated last year
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 5 years ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆17Updated 2 years ago
- PhantomsGate: Advanced Shellcode Injection Technique☆23Updated 11 months ago
- Malware development in Go, learn today, anti dynamic analysis & Static & sandboxes.☆12Updated 2 months ago
- Use onion scan to detect the dark net web service, This Repo Contained Recently Scan Results☆11Updated 6 years ago
- Legba recipes.☆50Updated 10 months ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Updated last year
- ShellOrd is a C2 (Command & Control) framework cross-platform and agent written in Rust & Java☆14Updated 9 months ago
- A tool for creating bitcoin stealing phishing clones of onion services on large scale☆33Updated last year
- IVRE's fork of the famous TCP port scanner. See below for details.☆40Updated 4 months ago