i3visio / blockchain_c2cLinks
A Proof of Concept to show how blockchain can solve C2C persistence. PoC originally presented at EuskalHack Security Congress 2017, updated and improved for Cybercamp 2017.
☆21Updated 7 years ago
Alternatives and similar repositories for blockchain_c2c
Users that are interested in blockchain_c2c are comparing it to the libraries listed below
Sorting:
- A DFIR tool to extract cryptocoin addresses and other indicators of compromise from binaries.☆56Updated last year
- Finding Ethereum nodes which are vulnerable to RPC-attacks☆32Updated 9 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 12 years ago
- Perform MiTM attack and remove encryption on Windows Remote Registry Protocol.☆34Updated 7 years ago
- BlackHat Europe 2017 Slides☆26Updated 7 years ago
- Unofficial WhatCMS API package☆42Updated 4 years ago
- ☆15Updated 2 years ago
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Updated 7 years ago
- [DEPRECATED] Kadabra is my automatic LFI Exploiter and Scanner, written in C++ and a couple extern module in Python.☆34Updated 5 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Updated 5 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Updated 5 years ago
- Capstone: Keylogger Trojan☆35Updated 7 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆84Updated 6 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Updated 4 years ago
- Automated Google dorking with custom search engines☆27Updated 5 years ago
- A simple code for detects Host header vulnerability☆11Updated 5 years ago
- Operation Fast Cash - Hidden Cobra‘s AIX PowerPC malware dissected☆25Updated 6 years ago
- Script is a proof of concept how to control your machine by using social media sites.☆21Updated 7 years ago
- Clickjacking Proof-of-Concept Exploit☆25Updated 4 years ago
- Collection of scripts that I have used on Red Team engagements☆16Updated 7 years ago
- Burp Intruder File Payload Generator☆18Updated 5 years ago
- A multi-threaded scanner that helps identify CORS flaws/misconfigurations☆19Updated 5 years ago
- Small script for retrieving incoming transactions based on provided hour period.☆13Updated 3 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆31Updated 7 years ago
- This application is developed to test the race condition vulnerability in the web application. We have discussed about this vulnerability…☆14Updated 8 years ago
- Scripts for OSCE☆18Updated 6 years ago
- Timeinator is an extension for Burp Suite that can be used to perform timing attacks over an unreliable network such as the internet.☆22Updated 2 years ago
- The PoC files for ethereum client's JSON-RPC DNS Rebinding☆35Updated 7 years ago
- This is an automated tool collection written in Python for vulnerability assessment and exploitation. It also includes solution of SPSE -…☆20Updated 8 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 7 years ago