i3visio / blockchain_c2c
A Proof of Concept to show how blockchain can solve C2C persistence. PoC originally presented at EuskalHack Security Congress 2017, updated and improved for Cybercamp 2017.
☆21Updated 7 years ago
Alternatives and similar repositories for blockchain_c2c
Users that are interested in blockchain_c2c are comparing it to the libraries listed below
Sorting:
- A DFIR tool to extract cryptocoin addresses and other indicators of compromise from binaries.☆56Updated last year
- ☆15Updated 2 years ago
- Unofficial WhatCMS API package☆42Updated 4 years ago
- Finding Ethereum nodes which are vulnerable to RPC-attacks☆33Updated 8 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- Modern Javascript keylogger with web panel☆22Updated 4 years ago
- Automated Google dorking with custom search engines☆27Updated 5 years ago
- My Dirty Scriptss ..!!!!! Pentest , OSINT , Python ,, Trainings☆53Updated 6 years ago
- [DEPRECATED] Kadabra is my automatic LFI Exploiter and Scanner, written in C++ and a couple extern module in Python.☆34Updated 5 years ago
- Bug Bounty Clipboard☆17Updated 5 years ago
- Just another tool to screenshot web servers☆16Updated 2 years ago
- A first look at browser-based Cryptojacking☆16Updated 6 years ago
- Perform MiTM attack and remove encryption on Windows Remote Registry Protocol.☆34Updated 7 years ago
- Search and extract blob files on the Ethereum Blockchain network☆45Updated 4 years ago
- BlackHat Europe 2017 Slides☆26Updated 7 years ago
- This application is developed to test the race condition vulnerability in the web application. We have discussed about this vulnerability…☆14Updated 8 years ago
- Automated Scanning, Pentesting , Exploiting and Reporting☆21Updated 3 years ago
- NmapPy - Python implementation of Nmap☆35Updated 6 years ago
- Some scripts useful for red team activities☆13Updated 5 years ago
- Public exploits☆14Updated 6 years ago
- python tools to assist in penetration testing☆14Updated last week
- Tool to identify all domains contained in an IP anonymously☆15Updated 7 years ago
- web information gathering / Grab links☆43Updated 5 years ago
- phishing reporting tool☆15Updated 6 years ago
- only for 31337☆23Updated 8 years ago
- The goal of this program is to quickly pull and install repos from its list☆40Updated 2 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Timeinator is an extension for Burp Suite that can be used to perform timing attacks over an unreliable network such as the internet.☆22Updated 2 years ago
- A continuously curated list of my favorite links and resources relating to Open Source Intelligence gathering.☆19Updated 6 years ago
- edge --> powerpoint --> remote-file --> shell☆12Updated 6 years ago