samjhill / skin-walletLinks
Store your crypto wallet seed phrase securely & publicly in a tattoo
☆22Updated 3 months ago
Alternatives and similar repositories for skin-wallet
Users that are interested in skin-wallet are comparing it to the libraries listed below
Sorting:
- ☆18Updated 2 years ago
- Crypto Burner Bot is a powerful utility designed to safeguard compromised wallet addresses by automatically burning any incoming ETH or B…☆39Updated 2 years ago
- Proxy requests to different Ethereum RPC servers and optionally alter the request.☆24Updated 2 years ago
- A tool for checking BigSpender vulnerability in your Bitcoin wallet☆39Updated 4 years ago
- Create vanity ethereum addresses like 0xda66666666c3a809ADA79D93114a3662073cC0 through brute force. Also has the ability to load a dictio…☆22Updated 2 years ago
- CLI utility that broadcasts BTC, ETH, SOL, ZEC & XMR transactions through TOR using public block explorers☆74Updated 10 months ago
- Linux kernel module which powers off the computer on certain text from keyboard☆45Updated 10 years ago
- Command line tool to convert and generate ethereum private keys [mnemonic, private key, keystore]☆19Updated last year
- Here is where I upload all the notes i take about the Ethereum world to share with everyone.☆23Updated 7 years ago
- Cross chain privacy☆22Updated this week
- 🔥⛓ Connect to any EVM chain instantly☆27Updated last year
- A tool to visually generate a private key and address with automatic balance and activity check across several EVM-compatible blockchains☆46Updated 3 months ago
- A curated list of blockchain security incidents including exchange hacks, DeFi compromises, blockchain attacks, and others.☆25Updated 4 years ago
- An educational website documenting the development of zk-rollups on Bitcoin.☆11Updated last year
- Ethereum/EVM Node Security Toolkit☆70Updated last year
- ☆17Updated 4 years ago
- ☆20Updated 6 years ago
- 📝 List of known exploits that abuse token approvals☆16Updated 3 weeks ago
- 👾 notes and resources on applied cryptography for decentralized protocols, both for privacy and optimization (e.g., zk, tees, fhe, mpc, …☆23Updated 2 weeks ago
- resource exhaustion vulnerabilities in PoSv3 cryptocurrencies☆24Updated 3 years ago
- A proof-of-concept for batching meta transactions.☆29Updated 3 years ago
- Smart Contract Security Practice | Lv1 Fallback Attack☆16Updated 3 years ago
- Hydralisk - scale and fund millions of EVM-chain wallets via CLI☆29Updated 2 years ago
- Convert an Ethereum private key to a public key☆17Updated 3 years ago
- ☆17Updated 4 years ago
- A crowdsourced data project to track politicians who have skin in the Bitcoin game.☆39Updated 2 months ago
- Sweep your wallet of ETH, erc20 & erc721 tokens.☆31Updated 2 years ago
- Broadcasting Transactions into the Bitcoin Network.☆10Updated last month
- A collection of BlockChain Solidity Smart Contracts: Building, Security & Exploits. Also exploring Cryptography (RSA, ECC) from Scratch.☆22Updated 6 months ago
- bitdrain - remote p2p bandwidth/cpu overage attack against bitcoin, dogecoin, etc.☆38Updated last year