cyclone-github / phantom_pwn
Tools to recover, extract and decrypt Phantom wallets
☆23Updated last week
Alternatives and similar repositories for phantom_pwn:
Users that are interested in phantom_pwn are comparing it to the libraries listed below
- Tools to recover, extract and decrypt metamask wallets☆17Updated last week
- ☆12Updated 7 months ago
- Fast scanner for exposed env files☆11Updated 2 years ago
- Command line interface to interact with hashes.com escrow service.☆37Updated 2 weeks ago
- Search and extract blob files on the Ethereum Blockchain network☆45Updated 4 years ago
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆26Updated 6 years ago
- ☆10Updated 2 years ago
- This bot can be used to auto withdraw balance.☆12Updated 3 years ago
- This is a phishing ready platform. Unlike other phishing methods, EvilnoVNC allows you to bypass 2FA using a real browser via noVNC conn…☆11Updated 2 years ago
- Some useful scripts for CobaltStrike☆10Updated 6 years ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆18Updated last year
- Spider - web crawler and local wordlist processor to generate frequency sorted wordlist / ngrams☆16Updated this week
- Wordlist compiled from Twitter usernames☆16Updated 2 years ago
- PoC local JSON-RPC load-balancer with opt-in anonymizer via Tor☆58Updated 2 years ago
- Rust-based password mutator for brute force attacks☆13Updated last month
- Cryptocurrency Triage Tool - Identify multiple cryptocurrency addresses and transactions from various wallet applications!☆17Updated 3 months ago
- wh cyberspace☆10Updated 2 years ago
- Legba recipes.☆49Updated 8 months ago
- If you still know the password and have Metamask's data files, you may be able to recover your wallet seed and imported private keys.☆22Updated last year
- Proof-Of-Concept SSH Worm. Not for illegal use.☆14Updated 7 years ago
- Alias identity manager for Red Teams, OSINT collectors, journalists, and privacy-conscious people☆20Updated last year
- MSFVenom Powershell Stager Encoder & Generator☆16Updated 4 years ago
- Haschcat Rules processor☆14Updated 2 years ago
- IP2Tor allows to determine whether an IP address is a Tor exit node.☆29Updated 4 years ago
- Multi-client Cross-platform Python Backdoor/Reverse Shell/RAT with AES Encryption☆7Updated 2 years ago
- Python3 script to dump breach data from Dehashed☆28Updated 9 months ago
- Decode Hashcat '$HEX[]' password output from a password list containing a mixture of non-encoded and encoded passwords☆23Updated 6 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 4 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆29Updated 9 months ago
- A Burp Plugin for Detecting Weaknesses in Content Security Policies☆10Updated 9 years ago