i3visio / blockchain_c2c
A Proof of Concept to show how blockchain can solve C2C persistence. PoC originally presented at EuskalHack Security Congress 2017, updated and improved for Cybercamp 2017.
☆21Updated 7 years ago
Alternatives and similar repositories for blockchain_c2c:
Users that are interested in blockchain_c2c are comparing it to the libraries listed below
- A DFIR tool to extract cryptocoin addresses and other indicators of compromise from binaries.☆56Updated last year
- Finding Ethereum nodes which are vulnerable to RPC-attacks☆33Updated 8 years ago
- [DEPRECATED] Kadabra is my automatic LFI Exploiter and Scanner, written in C++ and a couple extern module in Python.☆33Updated 5 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 12 years ago
- Perform MiTM attack and remove encryption on Windows Remote Registry Protocol.☆33Updated 7 years ago
- Automated Scanning, Pentesting , Exploiting and Reporting☆21Updated 3 years ago
- Basic Block-chain + mining concept using python☆13Updated 4 years ago
- ☆10Updated 10 years ago
- A Burp Plugin for Detecting Weaknesses in Content Security Policies☆10Updated 9 years ago
- BlackHat Europe 2017 Slides☆26Updated 7 years ago
- A simple code for detects Host header vulnerability☆11Updated 5 years ago
- A tool for fuzzing for ports that allow outgoing connections☆18Updated 6 years ago
- ☆15Updated 2 years ago
- Search and extract blob files on the Ethereum Blockchain network☆45Updated 3 years ago
- A tool to help you manage your leaks☆34Updated 7 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆83Updated 6 years ago
- A repository of LIVE malwares for your own joy and pleasure☆13Updated 8 years ago
- WebDigger is a python based tool, specially created to get a company's unknown domain for pentestor.☆17Updated 8 years ago
- Just another tool to screenshot web servers☆16Updated 2 years ago
- Automated Google dorking with custom search engines☆27Updated 4 years ago
- A collection of curated Java Deserialization Exploits☆10Updated 6 years ago
- phishing reporting tool☆15Updated 6 years ago
- A collection of Nmap NSE scripts that I made.☆27Updated 12 years ago
- Unofficial WhatCMS API package☆42Updated 4 years ago
- A Blockchain And Smart Contract Based CTF☆16Updated last year
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 4 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 7 years ago
- NmapPy - Python implementation of Nmap☆35Updated 6 years ago
- The goal of this program is to quickly pull and install repos from its list☆40Updated 2 years ago