cyclone-github / phantom_pwn
Tools to extract and decrypt Phantom wallets
☆15Updated 2 months ago
Alternatives and similar repositories for phantom_pwn:
Users that are interested in phantom_pwn are comparing it to the libraries listed below
- URL Spider - web crawler and wordlist / ngram generator☆11Updated 4 months ago
- Legba recipes.☆41Updated 3 months ago
- Haschcat Rules processor☆13Updated last year
- Phishable is a project that logs misconfigured DNS that can be exploited to conduct phishing attacks & spoof domains. Phishable helps org…☆21Updated last year
- ExplorerUACStealer it's a malware that steal credentials provided by users in UAC Auth in explorer using API Hooking with Detours in C++…☆14Updated last year
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆20Updated 7 months ago
- Password lists generated by deep learning algorithms.☆29Updated 4 years ago
- Password Transformation Tool (ptt) is a versatile utility designed for password cracking.☆24Updated this week
- A script for SOC operators' first analysis. Add new player in the game.☆8Updated 2 years ago
- Fuzz for hidden proxies, vhosts, and URLs☆16Updated 3 years ago
- A new web frontend for Hashtopolis☆26Updated this week
- Top hashpwn rules☆14Updated this week
- Monitor hashcat potfile for statistics☆8Updated last year
- Decode Hashcat '$HEX[]' password output from a password list containing a mixture of non-encoded and encoded passwords☆23Updated 5 years ago
- Search and extract blob files on the Ethereum Blockchain network☆45Updated 3 years ago
- Free Email Providers☆10Updated last year
- Easily-guessable Password Generator for Password Spray Attack☆20Updated 4 years ago
- ☆12Updated 2 months ago
- Scrape Pastebin API to collect daily pastes, setup a wordlist and be alerted by email when you have a match.☆48Updated last year
- FuzzSSH is a free software tool created to detect SSH (protocol) vulnerabilities.☆16Updated 2 years ago
- ☆15Updated 4 months ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆16Updated 2 years ago
- Top password lists generated from leaks collected from different paste sites☆28Updated last year
- SpiderFoot automates OSINT collection so that you can focus on analysis.☆10Updated last year
- fully Undetectable payload generator for metasploit☆11Updated last year
- Python port of Pipal for password analytics☆22Updated last year
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆18Updated 11 months ago
- A number of exploits and tools I've written for CVEs accredited to Marshall Whittaker/oxagast☆2Updated this week
- Detect & filter duplicate hashcat rules☆41Updated 3 years ago
- Simple passive Python Recon tool for subdomains enumeration with crt.sh☆18Updated 2 years ago