cyclone-github / phantom_pwnLinks
Tools to recover, extract and decrypt Phantom wallets
☆25Updated 3 months ago
Alternatives and similar repositories for phantom_pwn
Users that are interested in phantom_pwn are comparing it to the libraries listed below
Sorting:
- Tools to recover, extract and decrypt metamask wallets☆20Updated 3 months ago
- Search and extract blob files on the Ethereum Blockchain network☆45Updated 4 years ago
- wh cyberspace☆12Updated 2 years ago
- Command line interface to interact with hashes.com escrow service.☆37Updated this week
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Updated last year
- Some scripts useful for red team activities☆13Updated 5 years ago
- Spider - web crawler and local wordlist processor to generate frequency sorted wordlist / ngrams☆24Updated 3 weeks ago
- bitdrain - remote p2p bandwidth/cpu overage attack against bitcoin, dogecoin, etc.☆39Updated last year
- A tool for creating bitcoin stealing phishing clones of onion services on large scale☆33Updated last year
- This script monitors a Bitcoin wallet address and notifies the user when there are changes in the balance or new transactions.☆23Updated 2 years ago
- An End to End Encrypted SMS and SMS Tunneling app☆40Updated 2 years ago
- A boilerplate for developing, testing and deploying smart contracts using Hardhat and Ethers.js☆17Updated 2 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18Updated 3 years ago
- Fetch information about a public Google document.☆13Updated last year
- Rust-based password mutator for brute force attacks☆13Updated 3 months ago
- Some useful scripts for CobaltStrike☆10Updated 6 years ago
- LeakIX API Client/lib☆9Updated last year
- a cli google client that bypasses captcha and rate limiting by using the google alerts "preview" feature☆48Updated last year
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆18Updated 2 years ago
- ☆29Updated 2 years ago
- IP2Tor allows to determine whether an IP address is a Tor exit node.☆29Updated 5 years ago
- Just a better dirbuster☆13Updated 2 years ago
- Seekolver is a tool focused on attack-surface mapping. It performs searches for subdomains associated with root domains and root domains …☆39Updated last year
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆18Updated 3 months ago
- Haschcat Rules processor☆14Updated 2 years ago
- New version of telegram deanonymization bot☆84Updated last year
- Bypassing File Upload Restriction using Magic Bytes☆18Updated 3 years ago
- If you still know the password and have Metamask's data files, you may be able to recover your wallet seed and imported private keys.☆23Updated last year
- TikTok Scraper. Download video posts, collect user/trend/hashtag/music feed metadata, sign URL and etc.☆46Updated 3 years ago