visualbasic6 / drainLinks
bitdrain - remote p2p bandwidth/cpu overage attack against bitcoin, dogecoin, etc.
☆38Updated last year
Alternatives and similar repositories for drain
Users that are interested in drain are comparing it to the libraries listed below
Sorting:
- Blockchain Attack Vectors & Vulnerabilities to Smart Contracts☆30Updated 2 years ago
- A tool for creating bitcoin stealing phishing clones of onion services on large scale☆33Updated 2 years ago
- nodecraw allows you to perform web crawling on specified URLs. It utilizes various modules and libraries to crawl web pages, extract info…☆13Updated last year
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Updated last year
- Linux kernel module which powers off the computer on certain text from keyboard☆45Updated 10 years ago
- Store your crypto wallet seed phrase securely & publicly in a tattoo☆22Updated 2 months ago
- Detects and extracts images from Goerli Testnet blockchain☆24Updated 3 years ago
- Tools to recover, extract and decrypt Phantom wallets☆24Updated 6 months ago
- Crypto Burner Bot is a powerful utility designed to safeguard compromised wallet addresses by automatically burning any incoming ETH or B…☆39Updated 2 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆65Updated last year
- Sniffcon has a wide list of powerful online bug bounty tools which can be used to find security vulnerabilities.☆40Updated 2 years ago
- Hacking tool for enumeration and automated attacking. Port Scanner, Automatic SSH brute, DNS queries, IP and phonenumber geolocation☆15Updated 2 years ago
- A tool for checking BigSpender vulnerability in your Bitcoin wallet☆39Updated 4 years ago
- This is a phishing ready platform. Unlike other phishing methods, EvilnoVNC allows you to bypass 2FA using a real browser via noVNC conn…☆10Updated 2 years ago
- Scripts, POCs & bullshit☆29Updated 4 months ago
- Basics on commands/tools/info on how to do binary exploitation on a mobile phone☆56Updated 2 years ago
- Blind RCE fuzzer☆15Updated 2 years ago
- List of Github repositories and articles with list of dorks for different search engines☆30Updated 3 years ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆121Updated 2 years ago
- FuzzSSH is a free software tool created to detect SSH (protocol) vulnerabilities.☆16Updated 3 years ago
- Self-modifying malware in Rust☆28Updated 3 years ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆142Updated 3 years ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆43Updated last year
- Extendable Python script handler for automating penetration testing.☆40Updated 2 years ago
- Interactive shell to execute commands anonymously using Proxychains and Tor☆43Updated 2 years ago
- Auto Scanner and Auto exploiter web app tool V4 Leaked by #GhostSec☆64Updated 4 years ago
- ☆110Updated 2 years ago
- Seamlessly Detect and Construct Exploit POCs for ClickJacking Vulnerability using this Automated tool☆45Updated last year
- A collection of scripts to steal BTC from Lightning Network enabled custodial services. Only for educational purpose! Share your findings…☆17Updated 4 years ago
- Bitcoin Randstorm Exploit - Very Fast Private Key and Address Generator☆75Updated last year