mitchellkrogza / Badd-Boyz-Bitcoin-Scammers
A list of bitcoin addresses being used in Ransomware and Sextortion Scams
☆12Updated 3 years ago
Alternatives and similar repositories for Badd-Boyz-Bitcoin-Scammers:
Users that are interested in Badd-Boyz-Bitcoin-Scammers are comparing it to the libraries listed below
- A Proof of Concept to show how blockchain can solve C2C persistence. PoC originally presented at EuskalHack Security Congress 2017, updat…☆21Updated 6 years ago
- Squatm3gator is a complete web solution based on the python tool squatm3, designed to enumerate available domains generated modifying the…☆30Updated 3 years ago
- Basic Block-chain + mining concept using python☆13Updated 4 years ago
- Finding Ethereum nodes which are vulnerable to RPC-attacks☆33Updated 8 years ago
- A Passive DNS backend and collector☆31Updated 2 years ago
- Various exploits☆10Updated 7 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆28Updated 6 months ago
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆24Updated 3 years ago
- A DFIR tool to extract cryptocoin addresses and other indicators of compromise from binaries.☆57Updated last year
- This is a basic example of how to search into Shodan using the ShodanAPI.☆15Updated 11 years ago
- Tips to protect your personal and company data☆27Updated 4 years ago
- list of all the pastebins across all protocols (Tor, ZeroNet, etc.)☆40Updated 5 years ago
- World's first Bitcoin client ddos software // Experimental program to exhaust inbound TCP connections of a Bitcoin node☆24Updated 5 years ago
- A first look at browser-based Cryptojacking☆15Updated 6 years ago
- Proof-Of-Concept SSH Worm. Not for illegal use.☆14Updated 6 years ago
- This repository contains a list of tools that may be useful for consultants performing penetration testing engagements.☆19Updated 5 years ago
- Get trails tool: Get all urls indexed of target☆22Updated 3 years ago
- Slap the hell outta GitHub by harvesting emails by crunching through commits. The Dope OSINT tool.☆13Updated 6 years ago
- Generates IP, while Excluding/Including specific IP blocks. Useful in Mass Scanning.☆25Updated 10 years ago
- DNS logging, detection, ...☆15Updated 2 years ago
- Open-source Exploiting Framework☆29Updated 7 years ago
- Honeypot for router backdoor (TCP 32764)☆17Updated 10 years ago
- Search and extract blob files on the Ethereum Blockchain network☆45Updated 3 years ago
- A honeypot that can be used to observe traffic directed at home routers.☆18Updated 6 years ago
- Shodan.io connector for Phantom Cyber Security Orchestration☆21Updated 8 years ago
- Pull A List Of 1000 Most Popular Containers On Docker Hub☆14Updated 4 years ago
- Bustr is a utility built to discover if any new Usb, Storage, Phone or Bluetooth device has been attached/paired with system☆10Updated 3 years ago
- Collection of scripts that I have used on Red Team engagements☆16Updated 6 years ago
- Scripts I have written to perform various IT Security admin tasks. From validating findings to performing automated attacks☆19Updated 7 months ago
- scripts to setup pentesting system and use during pentest☆18Updated 2 years ago