k4m4 / cryptaddress.now
A minimal service to detect which cryptocurrency an address corresponds to.
☆26Updated last year
Related projects: ⓘ
- Detect whether a site is running behind Cloudflare.☆21Updated 3 months ago
- Simple file sharing over tor hidden services (v3)☆28Updated 4 years ago
- Hex encode & decode a string, right from your terminal.☆11Updated last year
- Detect the possible hash-types corresponding to a string, right from your terminal.☆11Updated last year
- Monitor traffic for unencrypted data and display a dashboard.☆15Updated 7 years ago
- Create your own TOR hidden service, and keep it secure. A guide on how to create a virtual machine that runs a tor hidden service website…☆90Updated 8 years ago
- A website outlining my bounty hunt game.☆10Updated 4 years ago
- Retrieve an array of possible hash types corresponding to a given string.☆17Updated last year
- Detect which cryptocurrency an address corresponds to.☆45Updated last year
- Backup scripts I use on my drives.☆25Updated 6 years ago
- Detect whether an IP address belongs to a Tor exit node.☆22Updated last year
- Advice on how to do computer things securely for non-experts☆61Updated 3 years ago
- Capstone: Keylogger Trojan☆35Updated 6 years ago
- Zcash Vanity Address Generator☆22Updated 3 years ago
- ☆29Updated this week
- a collection of teaching resources☆12Updated 6 years ago
- A Shadow plug-in that runs the Bitcoin Satoshi reference software☆25Updated 4 years ago
- Finding Ethereum nodes which are vulnerable to RPC-attacks☆31Updated 8 years ago
- Run Kali tools on all distributions. Offline search, including in package descriptions.☆97Updated 6 years ago
- Browser agnostic extension that enables pasting into password fields...☆15Updated 4 years ago
- Configuration templates for common network security platforms. YMMV.☆21Updated 8 months ago
- Social Engineering template for credential harvesting. (Facebook as an example).☆40Updated 6 years ago
- Wide internet scanner for etherum and other bitcoin mining devices using default SSH credentials☆42Updated 2 years ago
- The PoC files for ethereum client's JSON-RPC DNS Rebinding☆35Updated 6 years ago
- Social Engineering Tool Oriented to facebook☆53Updated 7 years ago
- Docker container to run PoisonTap☆15Updated 7 years ago
- Clickjacking Proof-of-Concept Exploit☆25Updated 3 years ago
- ☆13Updated 6 years ago
- A simple backdoor in (ba)sh with encrypted communication channel☆26Updated 7 years ago
- Recover the private key from signed DSA messages. (multiple signed messages, static coefficient 'k')☆38Updated 6 years ago