visualbasic6 / drainLinks
bitdrain - remote p2p bandwidth/cpu overage attack against bitcoin, dogecoin, etc.
☆39Updated last year
Alternatives and similar repositories for drain
Users that are interested in drain are comparing it to the libraries listed below
Sorting:
- nodecraw allows you to perform web crawling on specified URLs. It utilizes various modules and libraries to crawl web pages, extract info…☆12Updated 10 months ago
- A tool for creating bitcoin stealing phishing clones of onion services on large scale☆33Updated last year
- This script monitors a Bitcoin wallet address and notifies the user when there are changes in the balance or new transactions.☆23Updated 2 years ago
- If you still know the password and have Metamask's data files, you may be able to recover your wallet seed and imported private keys.☆23Updated last year
- Pentest scriptkit for your copypasta☆13Updated 2 months ago
- Linux kernel module which powers off the computer on certain text from keyboard☆39Updated 9 years ago
- Tools to recover, extract and decrypt Phantom wallets☆25Updated 3 months ago
- Google Chrome Cookies Stealer. Steals Chrome cookies☆44Updated last year
- Self-modifying malware in Rust☆28Updated 2 years ago
- A reconnaissance tool for ethical hackers written in RUST☆20Updated last year
- A tool for enumerating usernames from text, files, or websites☆81Updated 3 years ago
- Bash Script to automate the process of setting up a new Kali Linux virtual machine to look a like HTB PwnBox☆19Updated 2 years ago
- Tools to recover, extract and decrypt metamask wallets☆20Updated 3 months ago
- Sniffcon has a wide list of powerful online bug bounty tools which can be used to find security vulnerabilities.☆40Updated 2 years ago
- Blockchain Attack Vectors & Vulnerabilities to Smart Contracts☆27Updated 2 years ago
- LeakIX API Client/lib☆9Updated last year
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Updated last year
- Seekolver is a tool focused on attack-surface mapping. It performs searches for subdomains associated with root domains and root domains …☆39Updated last year
- AI Powered Terminal Based Ethical Hacking Assistant☆70Updated 5 months ago
- Store your crypto wallet seed phrase securely & publicly in a tattoo☆22Updated 3 years ago
- Proof of concept denial of service over TOR stress test tool☆41Updated 6 years ago
- udpy_proto_scanner is a Python script which discovers UDP services by sending triggers to a list of hosts☆47Updated last year
- Detects and extracts images from Goerli Testnet blockchain☆25Updated 3 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆14Updated 3 years ago
- Interactive shell to execute commands anonymously using Proxychains and Tor☆42Updated 2 years ago
- Rust-based password mutator for brute force attacks☆13Updated 3 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆65Updated last year
- FuzzSSH is a free software tool created to detect SSH (protocol) vulnerabilities.☆16Updated 3 years ago
- A simple very little blockchain, just for learning.☆27Updated 5 years ago
- This is a phishing ready platform. Unlike other phishing methods, EvilnoVNC allows you to bypass 2FA using a real browser via noVNC conn…☆11Updated 2 years ago