visualbasic6 / drain
bitdrain - remote p2p bandwidth/cpu overage attack against bitcoin, dogecoin, etc.
☆39Updated 11 months ago
Alternatives and similar repositories for drain:
Users that are interested in drain are comparing it to the libraries listed below
- A tool for creating bitcoin stealing phishing clones of onion services on large scale☆31Updated last year
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆18Updated last year
- nodecraw allows you to perform web crawling on specified URLs. It utilizes various modules and libraries to crawl web pages, extract info…☆12Updated 8 months ago
- LeakIX API Client/lib☆8Updated last year
- A collection of DuckyScript payloads targeting Linux systems.☆15Updated this week
- AI Powered Terminal Based Ethical Hacking Assistant☆63Updated 2 months ago
- If you still know the password and have Metamask's data files, you may be able to recover your wallet seed and imported private keys.☆22Updated last year
- Tools to recover, extract and decrypt metamask wallets☆17Updated last week
- A reconnaissance tool for ethical hackers written in RUST☆20Updated last year
- Fast scanner for exposed env files☆11Updated 2 years ago
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆24Updated 4 months ago
- ECC Public Key Cryptography☆37Updated last year
- Blockchain Attack Vectors & Vulnerabilities to Smart Contracts☆26Updated 2 years ago
- Bash Script to automate the process of setting up a new Kali Linux virtual machine to look a like HTB PwnBox☆20Updated 2 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆63Updated last year
- Store your crypto wallet seed phrase securely & publicly in a tattoo☆22Updated 3 years ago
- Self-modifying malware in Rust☆28Updated 2 years ago
- 🔐 explores techniques to exploit and manipulate buffer overflow vulnerabilities in a program.☆24Updated last year
- List of Hardware Wallets for Digital Forensics☆26Updated 4 months ago
- Basics on commands/tools/info on how to do binary exploitation on a mobile phone☆50Updated 2 years ago
- Crawls URL to get a better image of what is tied to a website.☆33Updated last year
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆14Updated 2 years ago
- udpy_proto_scanner is a Python script which discovers UDP services by sending triggers to a list of hosts☆47Updated last year
- ssb=simple subdomain bruteforcer☆19Updated 2 years ago
- Another vulnerability scanner☆19Updated last month
- To be used with tools like GoBuster & DirBuster but these lists are specifically tailored and designed for scanning phishing <>< landing …☆43Updated last week
- Proof of concept denial of service over TOR stress test tool☆41Updated 6 years ago
- Capture screenshots of onion services on an onion service.☆48Updated 10 months ago
- a curated list of shodan dorks for finding sensitive data in shodan.io☆28Updated 9 months ago
- Legba recipes.☆49Updated 8 months ago