visualbasic6 / drain
bitdrain - remote p2p bandwidth/cpu overage attack against bitcoin, dogecoin, etc.
☆39Updated 10 months ago
Alternatives and similar repositories for drain:
Users that are interested in drain are comparing it to the libraries listed below
- A tool for creating bitcoin stealing phishing clones of onion services on large scale☆31Updated last year
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆18Updated last year
- nodecraw allows you to perform web crawling on specified URLs. It utilizes various modules and libraries to crawl web pages, extract info…☆12Updated 7 months ago
- ssb=simple subdomain bruteforcer☆19Updated 2 years ago
- Detects and extracts images from Goerli Testnet blockchain☆26Updated 3 years ago
- List of Hardware Wallets for Digital Forensics☆27Updated 3 months ago
- Multi-threaded URL enumeration/content-discovery tool in Python.☆107Updated last year
- udpy_proto_scanner is a Python script which discovers UDP services by sending triggers to a list of hosts☆47Updated last year
- Search and extract blob files on the Ethereum Blockchain network☆45Updated 4 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆51Updated last year
- A reconnaissance tool for ethical hackers written in RUST☆20Updated 11 months ago
- ECC Public Key Cryptography☆37Updated last year
- Bash Script to automate the process of setting up a new Kali Linux virtual machine to look a like HTB PwnBox☆18Updated 2 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆60Updated last year
- ☆14Updated 2 years ago
- No-nonsense data breach search interface☆11Updated 8 months ago
- Tools to recover, extract and decrypt metamask wallets☆17Updated 2 months ago
- Blockchain Attack Vectors & Vulnerabilities to Smart Contracts☆26Updated 2 years ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Updated 11 months ago
- Rust-based password mutator for brute force attacks☆13Updated last week
- Multithreaded password cracker for SHA1, SHA256, SHA384, SHA512, and MD5 hash functions, coded in C#. This tool allows you to test the st…☆9Updated 3 years ago
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆26Updated last year
- spiders the bitcoin network and returns ip:port ipv4/ipv6☆11Updated 9 months ago
- Tool for bypassing logins vulnerable against SQL injection☆45Updated 11 months ago
- ☆111Updated 2 years ago
- Web Path Finder☆60Updated last year
- Linux kernel module which powers off the computer on certain text from keyboard☆39Updated 9 years ago
- 🔐 explores techniques to exploit and manipulate buffer overflow vulnerabilities in a program.☆24Updated last year
- Google Chrome Cookies Stealer. Steals Chrome cookies☆42Updated last year
- CLI utility that broadcasts BTC, ETH, SOL, ZEC & XMR transactions through TOR using public block explorers☆74Updated 3 months ago