visualbasic6 / drainLinks
bitdrain - remote p2p bandwidth/cpu overage attack against bitcoin, dogecoin, etc.
☆38Updated last year
Alternatives and similar repositories for drain
Users that are interested in drain are comparing it to the libraries listed below
Sorting:
- A tool for creating bitcoin stealing phishing clones of onion services on large scale☆35Updated 2 years ago
- Blockchain Attack Vectors & Vulnerabilities to Smart Contracts☆33Updated 2 years ago
- Linux kernel module which powers off the computer on certain text from keyboard☆45Updated 10 years ago
- Store your crypto wallet seed phrase securely & publicly in a tattoo☆22Updated 3 months ago
- Tools to recover, extract and decrypt Phantom wallets☆24Updated last week
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Updated last year
- Crypto Burner Bot is a powerful utility designed to safeguard compromised wallet addresses by automatically burning any incoming ETH or B…☆39Updated 2 years ago
- Detects and extracts images from Goerli Testnet blockchain☆25Updated 4 years ago
- nodecraw allows you to perform web crawling on specified URLs. It utilizes various modules and libraries to crawl web pages, extract info…☆13Updated last year
- HTB official Discord bot☆62Updated 2 weeks ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆141Updated 3 years ago
- ☆112Updated 3 years ago
- ☁️ LeakIX API Client (Unofficial)☆21Updated 2 weeks ago
- A Jambler.io partner mixer template for easy deployment on a Linux server. Includes the website template, the telegram bot and the rapid …☆37Updated last month
- Bypassing File Upload Restriction using Magic Bytes☆22Updated 3 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆65Updated last year
- Sweep your wallet of ETH, erc20 & erc721 tokens.☆31Updated 3 years ago
- Pentest scriptkit for your copypasta☆13Updated 6 months ago
- Interactive shell to execute commands anonymously using Proxychains and Tor☆48Updated 2 years ago
- This will encrypt 🤐 your files using AES-256-CTR, then RSA-4096😵💫to secure the exchange with the server, or can use the Tor SOCKS5 Pr…☆80Updated last year
- Dimorf is a ransomware using 256-bit AES with a self-destructing, randomly generated key for Linux OS´s☆59Updated 2 years ago
- Google Chrome Cookies Stealer. Steals Chrome cookies☆47Updated 2 years ago
- Crawls URL to get a better image of what is tied to a website.☆33Updated 2 years ago
- ☆23Updated 4 years ago
- A reconnaissance tool for ethical hackers written in RUST☆20Updated last year
- Sniffcon has a wide list of powerful online bug bounty tools which can be used to find security vulnerabilities.☆40Updated 2 years ago
- Basics on commands/tools/info on how to do binary exploitation on a mobile phone☆56Updated 2 years ago
- Tools to recover, extract and decrypt metamask wallets☆19Updated last week
- Seekolver is a tool focused on attack-surface mapping. It performs searches for subdomains associated with root domains and root domains …☆40Updated last year
- Simple Python Modular Script to Broke Web Logins☆14Updated 3 years ago