visualbasic6 / drain
bitdrain - remote p2p bandwidth/cpu overage attack against bitcoin, dogecoin, etc.
☆40Updated 9 months ago
Alternatives and similar repositories for drain:
Users that are interested in drain are comparing it to the libraries listed below
- A reconnaissance tool for ethical hackers written in RUST☆20Updated 10 months ago
- A tool for creating bitcoin stealing phishing clones of onion services on large scale☆31Updated last year
- Self-modifying malware in Rust☆27Updated 2 years ago
- Linux kernel module which powers off the computer on certain text from keyboard☆39Updated 9 years ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Updated 10 months ago
- ssshh its a secret ;)☆22Updated 2 years ago
- If you still know the password and have Metamask's data files, you may be able to recover your wallet seed and imported private keys.☆20Updated 10 months ago
- Blockchain Attack Vectors & Vulnerabilities to Smart Contracts☆24Updated 2 years ago
- nodecraw allows you to perform web crawling on specified URLs. It utilizes various modules and libraries to crawl web pages, extract info…☆12Updated 5 months ago
- Blind RCE fuzzer☆16Updated last year
- AI Powered Terminal Based Ethical Hacking Assistant☆58Updated 2 weeks ago
- udpy_proto_scanner is a Python script which discovers UDP services by sending triggers to a list of hosts☆46Updated last year
- Tools to recover, extract and decrypt metamask wallets☆12Updated last month
- ECC Public Key Cryptography☆36Updated last year
- Tools to recover, extract and decrypt Phantom wallets☆20Updated 2 weeks ago
- Sniffcon has a wide list of powerful online bug bounty tools which can be used to find security vulnerabilities.☆38Updated last year
- 🔐 explores techniques to exploit and manipulate buffer overflow vulnerabilities in a program.☆24Updated last year
- Google Chrome Cookies Stealer. Steals Chrome cookies☆39Updated last year
- Store your crypto wallet seed phrase securely & publicly in a tattoo☆21Updated 3 years ago
- Search and extract blob files on the Ethereum Blockchain network☆45Updated 3 years ago
- Basics on commands/tools/info on how to do binary exploitation on a mobile phone☆47Updated last year
- Blockchain technology has to be one of the biggest technology innovations of the past few years. The top emerging blockchain development …☆29Updated 2 years ago
- ☆111Updated 2 years ago
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆27Updated last year
- Legba recipes.☆44Updated 5 months ago
- Seekolver is a tool focused on attack-surface mapping. It performs searches for subdomains associated with root domains and root domains …☆40Updated last year
- SSH Backdoor for android☆12Updated 4 months ago
- A curated list of blockchain security incidents including exchange hacks, DeFi compromises, blockchain attacks, and others.☆25Updated 3 years ago
- Windows priviledge escalation script☆13Updated 2 weeks ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆51Updated last year