mitchellkrogza / Badd-Boyz-Bitcoin-Scammers
A list of bitcoin addresses being used in Ransomware and Sextortion Scams
☆12Updated 3 years ago
Related projects: ⓘ
- A Proof of Concept to show how blockchain can solve C2C persistence. PoC originally presented at EuskalHack Security Congress 2017, updat…☆21Updated 6 years ago
- A tool for checking BigSpender vulnerability in your Bitcoin wallet☆38Updated 3 years ago
- A Passive DNS backend and collector☆31Updated 2 years ago
- Finding Ethereum nodes which are vulnerable to RPC-attacks☆31Updated 8 years ago
- ☆56Updated this week
- This is a basic example of how to search into Shodan using the ShodanAPI.☆15Updated 10 years ago
- A first look at browser-based Cryptojacking☆15Updated 6 years ago
- ☆8Updated 3 years ago
- Tips to protect your personal and company data☆26Updated 4 years ago
- ☆17Updated this week
- Search and extract blob files on the Ethereum Blockchain network☆45Updated 3 years ago
- The HODLer Manifesto☆38Updated 3 years ago
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆23Updated 3 years ago
- ☆18Updated this week
- JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool☆11Updated 6 years ago
- scripts to setup pentesting system and use during pentest☆18Updated 2 years ago
- Generates IP, while Excluding/Including specific IP blocks. Useful in Mass Scanning.☆23Updated 9 years ago
- Safe Qubes OS screenshot tool with active VM detection & window border removal features☆12Updated 4 years ago
- Scripts related to offensiveosint.io☆19Updated 4 years ago
- Public exploits☆15Updated 6 years ago
- [ARCHIVED] Please report to https://github.com/funilrys/PyFunceble.☆30Updated 6 years ago
- DNS logging, detection, ...☆14Updated 2 years ago
- ☆12Updated this week
- Various exploits☆10Updated 7 years ago
- Maltego integration of https://clearbit.com☆32Updated 3 years ago
- The VPN Rotator is a Bash/Debian framework for security researchers eager to protect their residential IP and wanting to replay malware t…☆57Updated 2 months ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆19Updated 2 years ago
- World's first Bitcoin client ddos software // Experimental program to exhaust inbound TCP connections of a Bitcoin node☆24Updated 5 years ago
- Monitor traffic for unencrypted data and display a dashboard.☆15Updated 7 years ago