cyclone-github / phantom_pwnLinks
Tools to recover, extract and decrypt Phantom wallets
☆29Updated 3 weeks ago
Alternatives and similar repositories for phantom_pwn
Users that are interested in phantom_pwn are comparing it to the libraries listed below
Sorting:
- Tools to recover, extract and decrypt metamask wallets☆23Updated 3 weeks ago
- Tools to recover, extract and decrypt Atomic wallets☆12Updated last month
- bitdrain - remote p2p bandwidth/cpu overage attack against bitcoin, dogecoin, etc.☆37Updated last year
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Updated last year
- A tool for creating bitcoin stealing phishing clones of onion services on large scale☆36Updated 2 years ago
- Command line interface to interact with hashes.com escrow service.☆44Updated last month
- Spider - web crawler and local wordlist processor to generate frequency sorted wordlist / ngrams☆28Updated last month
- Crypto Burner Bot is a powerful utility designed to safeguard compromised wallet addresses by automatically burning any incoming ETH or B…☆39Updated 2 years ago
- Custom hashcat kernel for new Metamask Vaults☆19Updated last month
- ☆12Updated 2 years ago
- Search and extract blob files on the Ethereum Blockchain network☆44Updated 4 years ago
- New version of telegram deanonymization bot☆86Updated 2 years ago
- a cli google client that bypasses captcha and rate limiting by using the google alerts "preview" feature☆48Updated 2 years ago
- Detect real scammers with Wallet-Tracker CLI from anywhere.☆137Updated last year
- Custom rules by cyclone☆16Updated last month
- Seekolver is a tool focused on attack-surface mapping. It performs searches for subdomains associated with root domains and root domains …☆40Updated 2 years ago
- Legba recipes.☆51Updated last year
- An End to End Encrypted SMS and SMS Tunneling app☆40Updated 2 years ago
- wh cyberspace☆12Updated 3 years ago
- Phishable is a project that logs misconfigured DNS that can be exploited to conduct phishing attacks & spoof domains. Phishable helps org…☆21Updated 2 years ago
- Password lists generated by deep learning algorithms.☆34Updated 6 years ago
- A Case Study in Bypassing Client-Side Anti-Fraud Mechanisms☆68Updated last week
- Multi-threaded CMS BruteForcer to WordPress, Joomla, Drupal, OpenCart☆43Updated 7 years ago
- IP2Tor allows to determine whether an IP address is a Tor exit node.☆30Updated 5 years ago
- Slides and videos from talks given at cons☆25Updated 7 months ago
- Just a better dirbuster☆13Updated 3 years ago
- Proof-Of-Concept SSH Worm. Not for illegal use.☆14Updated 7 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆19Updated 2 years ago
- Determine if an email address exists or not on ProtonMail with NeutrOSINT☆34Updated last month
- Quickly look up hashes in your terminal using the HashMob API 🔥☆13Updated 2 years ago