cyclone-github / metamask_pwn
Tools to recover, extract and decrypt metamask wallets
☆12Updated last month
Alternatives and similar repositories for metamask_pwn:
Users that are interested in metamask_pwn are comparing it to the libraries listed below
- Tools to recover, extract and decrypt Phantom wallets☆20Updated 2 weeks ago
- Fast scanner for exposed env files☆11Updated 2 years ago
- ssshh its a secret ;)☆22Updated 2 years ago
- HTTP based framework for building command and control components for remote access trojans☆13Updated 3 years ago
- bitdrain - remote p2p bandwidth/cpu overage attack against bitcoin, dogecoin, etc.☆40Updated 9 months ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆51Updated last year
- A database of all bitcoin and ethereum private keys with automatic balance checker.☆22Updated 2 years ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆14Updated 2 years ago
- Replace any BTC, XMR, XLM, ETH, XRP, LTC, BCH, NEC, ZCASH, DASH, DOGE, WMR, WMG, WMX, Yandex money, Qiwi address to yours☆27Updated 3 years ago
- Bitcoin Randstorm Exploit - Very Fast Private Key and Address Generator☆61Updated last year
- Recover the private key from signed DSA messages. (multiple signed messages, static coefficient 'k')☆38Updated 6 years ago
- Terminal CryptoDeepTech for Google Colab☆27Updated last month
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆23Updated 2 months ago
- Proof-Of-Concept SSH Worm. Not for illegal use.☆14Updated 6 years ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Updated 10 months ago
- We have compiled an exhaustive list of cryptocurrency exchange hacks [ 2011 – 2022 ] – you will be amazed at how much has been stolen ove…☆12Updated 2 years ago
- A library for peer discovery inside the Tor network☆28Updated 10 months ago
- ☆35Updated 4 years ago
- Configurable, Community driven, HTTP C2 Profile☆14Updated 2 months ago
- ECDSA nonce-reuse attack to recover a private key.☆49Updated 4 years ago
- Rust-based password mutator for brute force attacks☆13Updated last year
- One weak transaction in ECDSA on the Bitcoin blockchain and with the help of Lattice Attack we received a Private Key to BTC coins☆28Updated 2 years ago
- Simple script to bulk check if IPs match networks☆12Updated 3 years ago
- Password Transformation Tool (ptt) is a versatile utility designed for password cracking.☆27Updated 2 months ago
- ☆14Updated last year
- Bitcoin (BTC) Private key checker from 1M btc address with valid balance.☆18Updated 9 months ago
- Public exploits☆15Updated 6 years ago
- Generate "custom" P2PKH bitcoin address by Brute Force. It checks if the wallet has any coins too :)☆10Updated 3 years ago
- Some useful scripts for CobaltStrike☆10Updated 6 years ago
- ExplorerUACStealer it's a malware that steal credentials provided by users in UAC Auth in explorer using API Hooking with Detours in C++…☆13Updated last year