cyclone-github / phantom_pwnLinks
Tools to recover, extract and decrypt Phantom wallets
☆29Updated 3 weeks ago
Alternatives and similar repositories for phantom_pwn
Users that are interested in phantom_pwn are comparing it to the libraries listed below
Sorting:
- Tools to recover, extract and decrypt metamask wallets☆23Updated 3 weeks ago
- Tools to recover, extract and decrypt Atomic wallets☆12Updated last month
- Command line interface to interact with hashes.com escrow service.☆44Updated last month
- Custom hashcat kernel for new Metamask Vaults☆19Updated last month
- Search and extract blob files on the Ethereum Blockchain network☆44Updated 4 years ago
- Crypto Burner Bot is a powerful utility designed to safeguard compromised wallet addresses by automatically burning any incoming ETH or B…☆39Updated 2 years ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Updated last year
- ☁️ LeakIX API Client (Unofficial)☆21Updated 2 months ago
- bitdrain - remote p2p bandwidth/cpu overage attack against bitcoin, dogecoin, etc.☆37Updated last year
- Detect real scammers with Wallet-Tracker CLI from anywhere.☆136Updated last year
- Metamask, Brave, Ronin, Binance Chain, Exodus, Atomic wallets checker☆51Updated 2 years ago
- a cli google client that bypasses captcha and rate limiting by using the google alerts "preview" feature☆48Updated 2 years ago
- ☆34Updated 2 years ago
- An HTTP proxy library for Go☆17Updated 3 years ago
- A boilerplate for developing, testing and deploying smart contracts using Hardhat and Ethers.js☆19Updated 3 years ago
- ☆12Updated 2 years ago
- Spider - web crawler and local wordlist processor to generate frequency sorted wordlist / ngrams☆28Updated last month
- Some scripts useful for red team activities☆13Updated 6 years ago
- Haschcat Rules processor☆14Updated 2 years ago
- Quickly look up hashes in your terminal using the HashMob API 🔥☆13Updated 2 years ago
- Password lists generated by deep learning algorithms.☆34Updated 6 years ago
- Decode Hashcat '$HEX[]' password output from a password list containing a mixture of non-encoded and encoded passwords☆24Updated 6 years ago
- convert SQL dumps and other leaked db dump formats to CSV☆52Updated last year
- Blockchain Attack Vectors & Vulnerabilities to Smart Contracts☆35Updated 3 years ago
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆35Updated 2 months ago
- New version of telegram deanonymization bot☆86Updated 2 years ago
- Custom rules by cyclone☆16Updated last month
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆19Updated 2 years ago
- Official python agent for using the distributed hashcracker Hashtopolis☆78Updated last month
- pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching☆12Updated 3 years ago