MikeyG1616's Stars
kkznch/inspection-nextjs-server-side-cache
Junior-Dollar/Thimble-bot-2.0
1xbet thimble game hack bot 🤖
Cardo16/flash-swap-arbitrage
Ethereum network frontrun bot for crypto arbitrage (C#)
0xBcamp/Flash-Loan-Arbitrage-Bot_June2023
JeanLucPons/BSGS
Baby Step Giant Step for SECPK1
GrosQuildu/CryptoAttacks
Implementation of attacks on cryptosystems
jvdsn/crypto-attacks
Python implementations of cryptographic attacks and utilities.
HashPals/Search-That-Hash
🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡
Ciphey/Ciphey
⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
s0md3v/Hash-Buster
Crack hashes in seconds.
brokencpp/Fake-Etherium-And-Bitcoin-Private-Key-Stealer-main
ValtteriL/OnionFermenter
A tool for creating bitcoin stealing phishing clones of onion services on large scale
AeX03/Figged-Wallet-BTC
🚀 - searches, decrypts, automatically sends to your bitcoin address.
ipsBruno/brute-force-seed-bitcoin
Find used seeds in blockchain
jairopaiva/BitcoinExprCracker
Este projeto é fruto de um estudo pessoal sobre o algoritmo Secp256k1. O objetivo dele é conseguir obter, usando apenas os valores da chave pública, o valor correto da chave privada.
CryptoXploit/crackBTCwallet
Crack encrypted master Key and ckey of a bitcoin wallet(POC)
pranksteess/ECDSA_crack
reversebrain/ecdsa-breaker
Ruby script for cracking ECDSA private key
pcaversaccio/ecdsa-nonce-reuse-attack
This repository implements a Python function that recovers the private key from two different signatures that use the same random nonce during signature generation.
tintinweb/ecdsa-private-key-recovery
A simple library to recover the private key of ECDSA and DSA signatures sharing the same nonce k and therefore having identical signature parameter r
GoldSaintEagle/ECDSA-SM2-Signing-Attack
Attacks on ECDSA/SM2 signing algorithms
demining/Polynonce-Attack
POLYNONCE ATTACK we use BITCOIN signatures as a Polynomial to an arbitrarily high power of 128 bits to get a Private Key
demining/Twist-Attack
In this article, we will implement a Twist Attack with an example and show how, using certain points on the secp256k1 elliptic curve, we can get partial private key values and restore a Bitcoin Wallet within 5-15 minutes using “Sagemath pollard rho function: (discrete_log_rho)” and “ Chinese Remainder Theorem” .
Meru852/Bitcoin-Key-Compression-Tool
Get R, S and Z values from Raw Bitcoin Transaction
iceland2k14/rsz
Retrieve ECDSA signature R,S,Z values from blockchain rawtx or txid.
mimoo/SSL-TLS-ECDSA-timing-attack
Timing Attack on TLS' ECDSA signature
bitlogik/lattice-attack
Lattice ECDSA attack
chunganhbk/Bitcoin-Key-Compression-Tool
Get R, S and Z values from Raw Bitcoin Transaction
f43250x/stateactorm
Get R, S and Z values from Raw Bitcoin Transaction
kudelskisecurity/ecdsa-polynomial-nonce-recurrence-attack