cyclone-github / phantom_pwnLinks
Tools to recover, extract and decrypt Phantom wallets
☆24Updated 2 weeks ago
Alternatives and similar repositories for phantom_pwn
Users that are interested in phantom_pwn are comparing it to the libraries listed below
Sorting:
- Tools to recover, extract and decrypt metamask wallets☆19Updated this week
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Updated last year
- Search and extract blob files on the Ethereum Blockchain network☆45Updated 4 years ago
- wh cyberspace☆12Updated 3 years ago
- a cli google client that bypasses captcha and rate limiting by using the google alerts "preview" feature☆48Updated 2 years ago
- New version of telegram deanonymization bot☆84Updated last year
- Crypto Burner Bot is a powerful utility designed to safeguard compromised wallet addresses by automatically burning any incoming ETH or B…☆39Updated 2 years ago
- Custom hashcat kernel for new Metamask Vaults☆18Updated 8 months ago
- A look into Google's JavaScript Clientside Security☆64Updated last month
- Spider - web crawler and local wordlist processor to generate frequency sorted wordlist / ngrams☆25Updated 3 weeks ago
- Some useful scripts for CobaltStrike☆11Updated 6 years ago
- Command line interface to interact with hashes.com escrow service.☆38Updated 3 months ago
- Process the exported Telegram chat history .html and generate a report message count by date, and most used words.☆54Updated 4 years ago
- Detect real scammers with Wallet-Tracker CLI from anywhere.☆136Updated last year
- An End to End Encrypted SMS and SMS Tunneling app☆40Updated 2 years ago
- bitdrain - remote p2p bandwidth/cpu overage attack against bitcoin, dogecoin, etc.☆38Updated last year
- This bot can be used to auto withdraw balance.☆13Updated 3 years ago
- A tool for creating bitcoin stealing phishing clones of onion services on large scale☆35Updated 2 years ago
- A localhost implementation of a botnet used to perform a credential stuffing attack☆14Updated 4 years ago
- Legba recipes.☆51Updated last year
- convert SQL dumps and other leaked db dump formats to CSV☆51Updated last year
- Anubis 7.0☆27Updated last year
- Proof-Of-Concept SSH Worm. Not for illegal use.☆14Updated 7 years ago
- Some scripts useful for red team activities☆13Updated 5 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆13Updated 3 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18Updated 3 years ago
- A blazing fast, high performance implementation of AutoRecon in Rust. A multi-threaded network reconnaissance tool which performs automa…☆43Updated 10 months ago
- Seekolver is a tool focused on attack-surface mapping. It performs searches for subdomains associated with root domains and root domains …☆40Updated last year
- A boilerplate for developing, testing and deploying smart contracts using Hardhat and Ethers.js☆19Updated 3 years ago
- Haschcat Rules processor☆14Updated 2 years ago