i3visio / blockchain_c2c
A Proof of Concept to show how blockchain can solve C2C persistence. PoC originally presented at EuskalHack Security Congress 2017, updated and improved for Cybercamp 2017.
☆21Updated 7 years ago
Alternatives and similar repositories for blockchain_c2c:
Users that are interested in blockchain_c2c are comparing it to the libraries listed below
- A DFIR tool to extract cryptocoin addresses and other indicators of compromise from binaries.☆56Updated last year
- Finding Ethereum nodes which are vulnerable to RPC-attacks☆33Updated 8 years ago
- NmapPy - Python implementation of Nmap☆35Updated 6 years ago
- Honeypot for router backdoor (TCP 32764)☆18Updated 11 years ago
- ☆15Updated 2 years ago
- Small and highly portable detection tests.☆12Updated 7 years ago
- Automated Google dorking with custom search engines☆27Updated 4 years ago
- Slap the hell outta GitHub by harvesting emails by crunching through commits. The Dope OSINT tool.☆13Updated 6 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- BlackHat Europe 2017 Slides☆26Updated 7 years ago
- A tool for fuzzing for ports that allow outgoing connections☆18Updated 6 years ago
- Clickjacking Proof-of-Concept Exploit☆25Updated 4 years ago
- Software exploitation training material☆15Updated 7 years ago
- Mass malicious script dump/Malware src dump☆15Updated 8 years ago
- Perform MiTM attack and remove encryption on Windows Remote Registry Protocol.☆33Updated 7 years ago
- Public exploits☆14Updated 6 years ago
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Updated 7 years ago
- A few SQL and XSS attack tools☆40Updated 5 years ago
- only for 31337☆22Updated 8 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 12 years ago
- WebDigger is a python based tool, specially created to get a company's unknown domain for pentestor.☆17Updated 8 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- Capstone: Keylogger Trojan☆35Updated 6 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- The Python Password-Protected Obfuscator☆34Updated 5 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆30Updated 6 years ago
- Tool to identify all domains contained in an IP anonymously☆15Updated 7 years ago
- A collection of curated Java Deserialization Exploits☆10Updated 6 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- Collection of scripts that I have used on Red Team engagements☆16Updated 7 years ago