cyclone-github / phantom_pwn
Tools to recover, extract and decrypt Phantom wallets
☆20Updated 2 weeks ago
Alternatives and similar repositories for phantom_pwn:
Users that are interested in phantom_pwn are comparing it to the libraries listed below
- Tools to recover, extract and decrypt metamask wallets☆12Updated last month
- Haschcat Rules processor☆13Updated last year
- Search and extract blob files on the Ethereum Blockchain network☆45Updated 3 years ago
- ☆12Updated 5 months ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Updated 10 months ago
- Wordlist compiled from Twitter usernames☆14Updated 2 years ago
- Command line interface to interact with hashes.com escrow service.☆36Updated last week
- Rust-based password mutator for brute force attacks☆13Updated last year
- URL Spider - web crawler and wordlist / ngram generator☆12Updated last month
- Decode Hashcat '$HEX[]' password output from a password list containing a mixture of non-encoded and encoded passwords☆23Updated 5 years ago
- hashgen - the blazingly fast hash generator☆28Updated 2 months ago
- Monitor hashcat potfile for statistics☆8Updated last year
- Top hashpwn rules☆17Updated 2 months ago
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆32Updated 3 months ago
- Most common AWS S3 bucket names.☆27Updated 4 years ago
- Public exploits☆15Updated 6 years ago
- Password Transformation Tool (ptt) is a versatile utility designed for password cracking.☆27Updated 2 months ago
- ☆35Updated 4 years ago
- Legba recipes.☆44Updated 6 months ago
- A boilerplate for developing, testing and deploying smart contracts using Hardhat and Ethers.js☆17Updated 2 years ago
- Notification webhook for GoPhish☆53Updated 8 months ago
- Python script that downloads all cracked passwords from leaks on hashes.org and merges them into a single wordlist.txt file.☆37Updated 3 years ago
- Easily-guessable Password Generator for Password Spray Attack☆20Updated 4 years ago
- Password lists generated by deep learning algorithms.☆29Updated 5 years ago
- Proof-Of-Concept SSH Worm. Not for illegal use.☆14Updated 6 years ago
- A Burp Plugin for Detecting Weaknesses in Content Security Policies☆10Updated 9 years ago
- Cryptocurrency Triage Tool - Identify multiple cryptocurrency addresses and transactions from various wallet applications!☆17Updated last month
- ☆30Updated last year
- ☆27Updated last year
- Some scripts useful for red team activities☆13Updated 5 years ago