mitchellkrogza / Badd-Boyz-Bitcoin-Scammers
A list of bitcoin addresses being used in Ransomware and Sextortion Scams
☆13Updated 3 years ago
Alternatives and similar repositories for Badd-Boyz-Bitcoin-Scammers:
Users that are interested in Badd-Boyz-Bitcoin-Scammers are comparing it to the libraries listed below
- Finding Ethereum nodes which are vulnerable to RPC-attacks☆33Updated 8 years ago
- A first look at browser-based Cryptojacking☆16Updated 6 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Updated 11 years ago
- JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool☆13Updated 7 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆29Updated 8 months ago
- scripts to setup pentesting system and use during pentest☆18Updated 2 years ago
- A DFIR tool to extract cryptocoin addresses and other indicators of compromise from binaries.☆56Updated last year
- A simple script for translating IP addresses to GeoLocations☆42Updated 2 years ago
- Tips to protect your personal and company data☆28Updated 4 years ago
- Telnet-2 allows to connect via Tor and define a custom timeout☆10Updated 5 years ago
- The LAZY script will make your life easier, and of course faster.☆9Updated 7 years ago
- A Passive DNS backend and collector☆31Updated 2 years ago
- Squatm3gator is a complete web solution based on the python tool squatm3, designed to enumerate available domains generated modifying the…☆31Updated 3 years ago
- Slap the hell outta GitHub by harvesting emails by crunching through commits. The Dope OSINT tool.☆13Updated 6 years ago
- Maltego integration of https://clearbit.com☆38Updated 4 years ago
- Shodan.io Command Line Interface☆44Updated 3 years ago
- A Proof of Concept to show how blockchain can solve C2C persistence. PoC originally presented at EuskalHack Security Congress 2017, updat…☆21Updated 7 years ago
- BruteForce SSH Login Credentials much Faster...!...Bring the Thunder of Asgard to SSH☆13Updated 11 months ago
- Mattermost - Shodan Slash command☆31Updated 8 years ago
- DPE - Default Password Enumeration☆34Updated 11 years ago
- Cryptocurrencies related Security resources☆14Updated last year
- Detect leaks in security event logs.☆20Updated 5 years ago
- In-depth Attack Surface Mapping and Asset Discovery☆12Updated 4 years ago
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆24Updated 3 years ago
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.com☆21Updated 10 years ago
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serve…☆36Updated 3 years ago
- SpiderFoot automates OSINT collection so that you can focus on analysis.☆11Updated last year
- (Unofficial) Python API for cybercrime-tracker.net☆37Updated 7 years ago
- Good info about DeepWeb and OSINT☆32Updated 3 weeks ago
- Get faucet DOGE coin every minutes☆17Updated 7 years ago