cyclone-github / phantom_pwnLinks
Tools to recover, extract and decrypt Phantom wallets
☆25Updated 5 months ago
Alternatives and similar repositories for phantom_pwn
Users that are interested in phantom_pwn are comparing it to the libraries listed below
Sorting:
- Tools to recover, extract and decrypt metamask wallets☆19Updated 5 months ago
- Search and extract blob files on the Ethereum Blockchain network☆45Updated 4 years ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Updated last year
- Command line interface to interact with hashes.com escrow service.☆38Updated 2 months ago
- New version of telegram deanonymization bot☆85Updated last year
- Phishable is a project that logs misconfigured DNS that can be exploited to conduct phishing attacks & spoof domains. Phishable helps org…☆22Updated 2 years ago
- A boilerplate for developing, testing and deploying smart contracts using Hardhat and Ethers.js☆19Updated 3 years ago
- a cli google client that bypasses captcha and rate limiting by using the google alerts "preview" feature☆48Updated 2 years ago
- Spider - web crawler and local wordlist processor to generate frequency sorted wordlist / ngrams☆25Updated last month
- wh cyberspace☆12Updated 2 years ago
- Custom hashcat kernel for new Metamask Vaults☆18Updated 7 months ago
- bitdrain - remote p2p bandwidth/cpu overage attack against bitcoin, dogecoin, etc.☆38Updated last year
- Process the exported Telegram chat history .html and generate a report message count by date, and most used words.☆54Updated 4 years ago
- Detect real scammers with Wallet-Tracker CLI from anywhere.☆136Updated last year
- ☆33Updated 2 years ago
- ☆111Updated 2 years ago
- Linux kernel module which powers off the computer on certain text from keyboard☆45Updated 9 years ago
- Most common AWS S3 bucket names.☆27Updated 5 years ago
- ☆25Updated last year
- Haschcat Rules processor☆14Updated 2 years ago
- Slides and videos from talks given at cons☆25Updated 3 months ago
- Crypto Burner Bot is a powerful utility designed to safeguard compromised wallet addresses by automatically burning any incoming ETH or B…☆38Updated 2 years ago
- A first look at browser-based Cryptojacking☆17Updated 7 years ago
- Query GraphSense clusters, details and attribution tag-packs directly in Maltego. By an initial idea of our Swiss Federal Police colleag…☆34Updated 8 months ago
- Rust-based password mutator for brute force attacks☆13Updated 6 months ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆19Updated 2 years ago
- This bot can be used to auto withdraw balance.☆12Updated 3 years ago
- Scripts by cyclone to automate tasks☆25Updated 4 months ago
- Legba recipes.☆50Updated last year
- (Semi-)curated list of WiFi-related software projects based on 0x90/wifi-arsenal☆68Updated 5 years ago