visualbasic6 / drainLinks
bitdrain - remote p2p bandwidth/cpu overage attack against bitcoin, dogecoin, etc.
☆38Updated last year
Alternatives and similar repositories for drain
Users that are interested in drain are comparing it to the libraries listed below
Sorting:
- nodecraw allows you to perform web crawling on specified URLs. It utilizes various modules and libraries to crawl web pages, extract info…☆13Updated last year
- Blockchain Attack Vectors & Vulnerabilities to Smart Contracts☆30Updated 2 years ago
- Store your crypto wallet seed phrase securely & publicly in a tattoo☆22Updated last month
- Linux kernel module which powers off the computer on certain text from keyboard☆45Updated 9 years ago
- Tools to recover, extract and decrypt Phantom wallets☆25Updated 5 months ago
- A tool for creating bitcoin stealing phishing clones of onion services on large scale☆33Updated 2 years ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Updated last year
- Blind RCE fuzzer☆15Updated 2 years ago
- A list of useful Crypto resources for OSINT investigations☆311Updated 6 months ago
- Detects and extracts images from Goerli Testnet blockchain☆25Updated 3 years ago
- 🎞 lan and wifi interception. Gnu/Linux Version☆17Updated 4 years ago
- ssb=simple subdomain bruteforcer☆19Updated 2 years ago
- Proof of concept denial of service over TOR stress test tool☆41Updated 7 years ago
- Basics on commands/tools/info on how to do binary exploitation on a mobile phone☆57Updated 2 years ago
- Hacking tool for enumeration and automated attacking. Port Scanner, Automatic SSH brute, DNS queries, IP and phonenumber geolocation☆14Updated 2 years ago
- Extendable Python script handler for automating penetration testing.☆40Updated 2 years ago
- Sniffcon has a wide list of powerful online bug bounty tools which can be used to find security vulnerabilities.☆40Updated 2 years ago
- Crypto Burner Bot is a powerful utility designed to safeguard compromised wallet addresses by automatically burning any incoming ETH or B…☆38Updated 2 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆65Updated last year
- Crawls URL to get a better image of what is tied to a website.☆33Updated 2 years ago
- ☆13Updated 3 years ago
- CryptChat: Beyond Secure Messaging 🛡️☆71Updated last year
- ☆24Updated 3 years ago
- FuzzSSH is a free software tool created to detect SSH (protocol) vulnerabilities.☆16Updated 3 years ago
- Scripts, POCs & bullshit☆29Updated 3 months ago
- || Activate Burp Suite Pro with Loader and Key-Generator ||☆38Updated 4 years ago
- OSINT - Data Visualization - Blockchain - Awareness - Scam☆44Updated last year
- 🕵️ OSINT Tool (github tracker)☆163Updated last year
- ☆111Updated 2 years ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆42Updated last year