visualbasic6 / drainLinks
bitdrain - remote p2p bandwidth/cpu overage attack against bitcoin, dogecoin, etc.
☆38Updated last year
Alternatives and similar repositories for drain
Users that are interested in drain are comparing it to the libraries listed below
Sorting:
- Blockchain Attack Vectors & Vulnerabilities to Smart Contracts☆32Updated 2 years ago
- Store your crypto wallet seed phrase securely & publicly in a tattoo☆22Updated 3 months ago
- A tool for creating bitcoin stealing phishing clones of onion services on large scale☆35Updated 2 years ago
- Linux kernel module which powers off the computer on certain text from keyboard☆45Updated 10 years ago
- Crypto Burner Bot is a powerful utility designed to safeguard compromised wallet addresses by automatically burning any incoming ETH or B…☆39Updated 2 years ago
- Tools to recover, extract and decrypt Phantom wallets☆24Updated 2 weeks ago
- nodecraw allows you to perform web crawling on specified URLs. It utilizes various modules and libraries to crawl web pages, extract info…☆13Updated last year
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Updated last year
- A curated list of blockchain security incidents including exchange hacks, DeFi compromises, blockchain attacks, and others.☆25Updated 4 years ago
- A tool for checking BigSpender vulnerability in your Bitcoin wallet☆39Updated 4 years ago
- CloudFlare-IP is a tool which aims to gather origin IP of the website protected by Cloudflare from the website's favicon icon using Shoda…☆65Updated 6 years ago
- ☆111Updated 2 years ago
- Self-modifying malware in Rust☆28Updated 3 years ago
- We have compiled an exhaustive list of cryptocurrency exchange hacks [ 2011 – 2022 ] – you will be amazed at how much has been stolen ove…☆12Updated 2 years ago
- Scripts, POCs & bullshit☆30Updated 5 months ago
- ☆23Updated 4 years ago
- Hacking tool for enumeration and automated attacking. Port Scanner, Automatic SSH brute, DNS queries, IP and phonenumber geolocation☆14Updated 2 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆65Updated last year
- Blind RCE fuzzer☆15Updated 2 years ago
- Tools to recover, extract and decrypt metamask wallets☆19Updated this week
- 1000 black hat tools Collected From github☆16Updated 5 years ago
- Search and extract blob files on the Ethereum Blockchain network☆45Updated 4 years ago
- Capture screenshots of onion services on an onion service.☆72Updated last year
- The program for scanning and testing city cameras (DVR, RTSP, Hikvision) is a tool developed exclusively for educational purposes to anal…☆97Updated 7 months ago
- ssb=simple subdomain bruteforcer☆19Updated 2 years ago
- A list of useful Crypto resources for OSINT investigations☆326Updated 7 months ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆14Updated 3 years ago
- Seekolver is a tool focused on attack-surface mapping. It performs searches for subdomains associated with root domains and root domains …☆40Updated last year
- A custom Google search (to bypass some limitations on google and VPNs)☆112Updated 2 years ago
- A reconnaissance tool for ethical hackers written in RUST☆20Updated last year