i3visio / blockchain_c2c
A Proof of Concept to show how blockchain can solve C2C persistence. PoC originally presented at EuskalHack Security Congress 2017, updated and improved for Cybercamp 2017.
☆21Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for blockchain_c2c
- Finding Ethereum nodes which are vulnerable to RPC-attacks☆31Updated 8 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 11 years ago
- A DFIR tool to extract cryptocoin addresses and other indicators of compromise from binaries.☆57Updated last year
- web information gathering / Grab links☆41Updated 5 years ago
- Unofficial WhatCMS API package☆43Updated 3 years ago
- Automated Google dorking with custom search engines☆26Updated 4 years ago
- Perform MiTM attack and remove encryption on Windows Remote Registry Protocol.☆33Updated 7 years ago
- ☆11Updated 9 years ago
- Search and extract blob files on the Ethereum Blockchain network☆45Updated 3 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- Clickjacking Proof-of-Concept Exploit☆25Updated 4 years ago
- A repository of LIVE malwares for your own joy and pleasure☆13Updated 8 years ago
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Updated 6 years ago
- Hand list of Powershell commands frequently used during penetration tests☆14Updated 6 years ago
- Ubuntu stealer, steal ubuntu information in local pc☆20Updated 4 years ago
- ☆15Updated last year
- [DEPRECATED] Kadabra is my automatic LFI Exploiter and Scanner, written in C++ and a couple extern module in Python.☆33Updated 5 years ago
- Operation Fast Cash - Hidden Cobra‘s AIX PowerPC malware dissected☆25Updated 5 years ago
- phishing reporting tool☆15Updated 6 years ago
- Red Team Tool Kit☆13Updated 5 years ago
- Shodanwave - Netwave IP Camera☆18Updated 7 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- Just another tool to screenshot web servers☆16Updated last year
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 6 years ago
- Small script for retrieving incoming transactions based on provided hour period.☆11Updated 2 years ago