cyclone-github / phantom_pwnLinks
Tools to recover, extract and decrypt Phantom wallets
☆24Updated 2 months ago
Alternatives and similar repositories for phantom_pwn
Users that are interested in phantom_pwn are comparing it to the libraries listed below
Sorting:
- Tools to recover, extract and decrypt metamask wallets☆19Updated 2 months ago
- Search and extract blob files on the Ethereum Blockchain network☆45Updated 4 years ago
- Wordlist compiled from Twitter usernames☆17Updated 2 years ago
- Haschcat Rules processor☆14Updated 2 years ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Updated last year
- A boilerplate for developing, testing and deploying smart contracts using Hardhat and Ethers.js☆17Updated 2 years ago
- A Burp Plugin for Detecting Weaknesses in Content Security Policies☆10Updated 9 years ago
- wh cyberspace☆12Updated 2 years ago
- Command line interface to interact with hashes.com escrow service.☆37Updated 2 months ago
- Fast scanner for exposed env files☆12Updated 2 years ago
- This script monitors a Bitcoin wallet address and notifies the user when there are changes in the balance or new transactions.☆24Updated last year
- Spider - web crawler and local wordlist processor to generate frequency sorted wordlist / ngrams☆20Updated this week
- A simple very little blockchain, just for learning.☆27Updated 5 years ago
- ☆13Updated 2 years ago
- Blind RCE fuzzer☆16Updated last year
- IP2Tor allows to determine whether an IP address is a Tor exit node.☆29Updated 4 years ago
- This bot can be used to auto withdraw balance.☆13Updated 3 years ago
- If you still know the password and have Metamask's data files, you may be able to recover your wallet seed and imported private keys.☆23Updated last year
- Alias identity manager for Red Teams, OSINT collectors, journalists, and privacy-conscious people☆20Updated last year
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆27Updated 7 years ago
- edge --> powerpoint --> remote-file --> shell☆12Updated 6 years ago
- Proof-Of-Concept SSH Worm. Not for illegal use.☆14Updated 7 years ago
- bitdrain - remote p2p bandwidth/cpu overage attack against bitcoin, dogecoin, etc.☆39Updated last year
- Some scripts useful for red team activities☆13Updated 5 years ago
- ☆33Updated 2 years ago
- ☆38Updated 3 years ago
- ☆15Updated 2 years ago
- Just a better dirbuster☆13Updated 2 years ago
- Install and upgrade projectdiscovery tools☆10Updated 3 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆36Updated 4 years ago