Cryptanalysis of the DAO exploit & Multi-Stage Attack
☆19Apr 3, 2024Updated last year
Alternatives and similar repositories for Dao-Exploit
Users that are interested in Dao-Exploit are comparing it to the libraries listed below
Sorting:
- Linux kernel LPE practice with an NPD vulnerability☆36Jul 11, 2023Updated 2 years ago
- ☆11Aug 31, 2023Updated 2 years ago
- Reducing the private key through scalar multiplication using the ECPy + Google Colab library☆13Dec 7, 2022Updated 3 years ago
- A mempool listener for contract specific transactions.☆13Aug 19, 2024Updated last year
- Simple CVE-2021-20294 poc☆11Jan 21, 2023Updated 3 years ago
- Exploits for CVE-2023-27327 and CVE-2023-27328☆14May 9, 2023Updated 2 years ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆51Jun 18, 2022Updated 3 years ago
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- Code and result files (models, etc.) related to Metadata Digger's parts using Artificial Intelligence methods.☆12Feb 4, 2020Updated 6 years ago
- A simple to use single-include Windows API resolver☆23Jul 9, 2024Updated last year
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Aug 4, 2022Updated 3 years ago
- hashcat benchmarks on AWS instances☆39Sep 15, 2025Updated 5 months ago
- A repo that contains a recursive dump from the ROOT key of every Windows Registry hive (using KAPE) from a vanilla (clean) install of eve…☆53Oct 29, 2025Updated 4 months ago
- ☆15Jul 20, 2022Updated 3 years ago
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆48Dec 5, 2023Updated 2 years ago
- Post-exploitation tool☆26Mar 7, 2021Updated 4 years ago
- .NET 2.0 CLR project to retrieve saved browser credentials from Google Chrome, Mozilla Firefox and Microsoft Internet Explorer/Edge.☆22Aug 13, 2018Updated 7 years ago
- Search for private keys to receive Bitcoins using own algorithm "Bloom filter".☆35Mar 20, 2025Updated 11 months ago
- privilege escalation POCs built in Rust.☆19Jun 30, 2022Updated 3 years ago
- Strstr with user-supplied needle and filename as a BOF.☆32Sep 27, 2021Updated 4 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Aug 29, 2021Updated 4 years ago
- This Burpsuite plugin allows for multiple web app testers to share their proxy history with each other in real time. Requests that comes …☆23Mar 4, 2020Updated 5 years ago
- Quaithe empowers you to execute multiple commands in parallel for blazing-fast performance.☆28Aug 20, 2023Updated 2 years ago
- Super organized and flexible script for sending phishing campaigns☆56Nov 28, 2021Updated 4 years ago
- Slide decks and/or materials from conference presentations☆56Nov 15, 2022Updated 3 years ago
- SLib is a sandbox evasion library that implements some of the checks from https://evasions.checkpoint.com in C#☆66Aug 29, 2023Updated 2 years ago
- Capture screenshots of onion services on an onion service.☆73Jun 11, 2024Updated last year
- Playground for Race Condition attack☆24Mar 18, 2023Updated 2 years ago
- Query GraphSense clusters, details and attribution tag-packs directly in Maltego. By an initial idea of our Swiss Federal Police colleag…☆36Dec 28, 2024Updated last year
- Terminal CryptoDeepTech for Google Colab☆32Jan 28, 2026Updated last month
- ☆21Aug 31, 2023Updated 2 years ago
- List of GREP modifications and alternatives for a variety of purposes☆137Dec 20, 2025Updated 2 months ago
- ☆116Sep 5, 2023Updated 2 years ago
- One weak transaction in ECDSA on the Bitcoin blockchain and with the help of Lattice Attack we received a Private Key to BTC coins☆31Dec 7, 2022Updated 3 years ago
- Event Masker is a Splunk streaming command to mask event from search based on a list of rules that contain conditions.☆16Oct 11, 2022Updated 3 years ago
- Cute "Pure Shell" Script-Running CLI☆42Oct 27, 2025Updated 4 months ago
- Revised shell script for parsing .gnmap, .xml, or .nmap port scan results files to a CSV list, lists of IPs per port, web urls, and a sum…☆13Apr 17, 2020Updated 5 years ago
- Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely☆76Jul 31, 2024Updated last year