visualbasic6 / drainLinks
bitdrain - remote p2p bandwidth/cpu overage attack against bitcoin, dogecoin, etc.
☆38Updated last year
Alternatives and similar repositories for drain
Users that are interested in drain are comparing it to the libraries listed below
Sorting:
- Store your crypto wallet seed phrase securely & publicly in a tattoo☆22Updated 4 months ago
- A tool for creating bitcoin stealing phishing clones of onion services on large scale☆36Updated 2 years ago
- Blockchain Attack Vectors & Vulnerabilities to Smart Contracts☆34Updated 2 years ago
- Linux kernel module which powers off the computer on certain text from keyboard☆45Updated 10 years ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Updated last year
- Tools to recover, extract and decrypt Phantom wallets☆26Updated this week
- nodecraw allows you to perform web crawling on specified URLs. It utilizes various modules and libraries to crawl web pages, extract info…☆13Updated last year
- Crypto Burner Bot is a powerful utility designed to safeguard compromised wallet addresses by automatically burning any incoming ETH or B…☆39Updated 2 years ago
- ☆23Updated 4 years ago
- Bitcoin Randstorm Exploit - Very Fast Private Key and Address Generator☆76Updated last year
- ☆112Updated 3 years ago
- This will encrypt 🤐 your files using AES-256-CTR, then RSA-4096😵💫to secure the exchange with the server, or can use the Tor SOCKS5 Pr…☆80Updated last year
- ssb=simple subdomain bruteforcer☆19Updated 2 years ago
- Tools to recover, extract and decrypt metamask wallets☆20Updated this week
- No-nonsense data breach search interface☆11Updated last year
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆65Updated last year
- A collection of scripts to steal BTC from Lightning Network enabled custodial services. Only for educational purpose! Share your findings…☆17Updated 4 years ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆143Updated 3 years ago
- A list of useful Crypto resources for OSINT investigations☆334Updated 8 months ago
- FUD Linux Remote Access Trojan☆18Updated 3 years ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆37Updated 2 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆14Updated 3 years ago
- Self-modifying malware in Rust☆29Updated 3 years ago
- Hacking tool for enumeration and automated attacking. Port Scanner, Automatic SSH brute, DNS queries, IP and phonenumber geolocation☆14Updated 2 years ago
- Sweep your wallet of ETH, erc20 & erc721 tokens.☆30Updated 3 years ago
- Detects and extracts images from Goerli Testnet blockchain☆24Updated 4 years ago
- Execute code using Azure Automation service without getting charged☆143Updated 2 years ago
- Proof of concept denial of service over TOR stress test tool☆42Updated 7 years ago
- Quickly open your favorite Web IDE to review the selected smart contract codebase☆30Updated last year
- A reconnaissance tool for ethical hackers written in RUST☆20Updated last year