visualbasic6 / drainLinks
bitdrain - remote p2p bandwidth/cpu overage attack against bitcoin, dogecoin, etc.
☆39Updated last year
Alternatives and similar repositories for drain
Users that are interested in drain are comparing it to the libraries listed below
Sorting:
- Blockchain Attack Vectors & Vulnerabilities to Smart Contracts☆27Updated 2 years ago
- nodecraw allows you to perform web crawling on specified URLs. It utilizes various modules and libraries to crawl web pages, extract info…☆12Updated 10 months ago
- Self-modifying malware in Rust☆28Updated 2 years ago
- A tool for creating bitcoin stealing phishing clones of onion services on large scale☆33Updated last year
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Updated last year
- ☆23Updated 3 years ago
- A reconnaissance tool for ethical hackers written in RUST☆20Updated last year
- Proof of concept denial of service over TOR stress test tool☆41Updated 6 years ago
- ssb=simple subdomain bruteforcer☆19Updated 2 years ago
- Tools to recover, extract and decrypt metamask wallets☆19Updated 2 months ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆14Updated 3 years ago
- Linux kernel module which powers off the computer on certain text from keyboard☆39Updated 9 years ago
- A simple very little blockchain, just for learning.☆27Updated 5 years ago
- Capture screenshots of onion services on an onion service.☆49Updated last year
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆36Updated 2 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆65Updated last year
- Blind RCE fuzzer☆16Updated last year
- Bash Script to automate the process of setting up a new Kali Linux virtual machine to look a like HTB PwnBox☆19Updated 2 years ago
- Dimorf is a ransomware using 256-bit AES with a self-destructing, randomly generated key for Linux OS´s☆58Updated 2 years ago
- Extendable Python script handler for automating penetration testing.☆39Updated 2 years ago
- 🔐 explores techniques to exploit and manipulate buffer overflow vulnerabilities in a program.☆24Updated 2 years ago
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆25Updated 6 months ago
- AI Powered Terminal Based Ethical Hacking Assistant☆69Updated 4 months ago
- It is a project produced to expose the main logic of OSINT-AI tools offered for sale on the DarkWeb☆34Updated last year
- Open source darknet market with lightning network payments☆45Updated 2 years ago
- Google Chrome Cookies Stealer. Steals Chrome cookies☆44Updated last year
- C2 Server for pentesting, exploitation, and payload creation☆11Updated 11 months ago
- ☆14Updated 2 years ago
- ssshh its a secret ;)☆22Updated 3 years ago
- This script monitors a Bitcoin wallet address and notifies the user when there are changes in the balance or new transactions.☆24Updated last year