i3visio / blockchain_c2c
A Proof of Concept to show how blockchain can solve C2C persistence. PoC originally presented at EuskalHack Security Congress 2017, updated and improved for Cybercamp 2017.
☆21Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for blockchain_c2c
- ☆15Updated last year
- Finding Ethereum nodes which are vulnerable to RPC-attacks☆31Updated 8 years ago
- ☆11Updated 9 years ago
- Automated Google dorking with custom search engines☆26Updated 4 years ago
- A DFIR tool to extract cryptocoin addresses and other indicators of compromise from binaries.☆55Updated last year
- The goal of this program is to quickly pull and install repos from its list☆39Updated last year
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆82Updated 6 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 11 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- Software exploitation training material☆15Updated 7 years ago
- Just a silly recon tool that uses data from SSL Certificates to find potential host names☆30Updated last year
- Python driver for Wappalyzer, a web application detection utility.☆10Updated 4 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- This application is developed to test the race condition vulnerability in the web application. We have discussed about this vulnerability…☆14Updated 8 years ago
- Unofficial WhatCMS API package☆43Updated 3 years ago
- The Python Password-Protected Obfuscator☆34Updated 5 years ago
- A few SQL and XSS attack tools☆40Updated 4 years ago
- Perform MiTM attack and remove encryption on Windows Remote Registry Protocol.☆33Updated 7 years ago
- Hacking Wordlist collections for password cracking are attached in the below files☆16Updated 6 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 3 years ago
- Operation Fast Cash - Hidden Cobra‘s AIX PowerPC malware dissected☆25Updated 5 years ago
- bash script to enumerate vulnerabilities on specific year through Shodan API☆46Updated 5 years ago
- MS17-010☆12Updated 7 years ago
- this contain many web shells used to make a backdoor on a server☆10Updated 7 years ago
- A tool for fuzzing for ports that allow outgoing connections☆20Updated 6 years ago
- NmapPy - Python implementation of Nmap☆35Updated 5 years ago
- Create wordlists from source codes files/directories for enumeration☆30Updated last year