Advanced phishing tool | Automated Self-Hosting | SSH tunneling | 32+ Templates | Remastered version of xHak9x. (The only one you will find which is working fr)
-
Updated
Aug 29, 2025 - HTML
Advanced phishing tool | Automated Self-Hosting | SSH tunneling | 32+ Templates | Remastered version of xHak9x. (The only one you will find which is working fr)
Sistema gráfico de hacking, hecho por mí en HTML.
This repository hosts the public website for the paper "Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation" via GitHub Pages.
LATTICE ATTACK 249bits we solve the problem of hidden numbers using 79 signatures ECDSA
In this article, we will implement a Twist Attack with an example and show how, using certain points on the secp256k1 elliptic curve, we can get partial private key values and restore a Bitcoin Wallet within 5-15 minutes using “Sagemath pollard rho function: (discrete_log_rho)” and “ Chinese Remainder Theorem” .
Attack 51%: Cryptocurrency Vulnerability Revealed
POLYNONCE ATTACK we use BITCOIN signatures as a Polynomial to an arbitrarily high power of 128 bits to get a Private Key
Currently in development. Do not use.
In this article, we will implement a Twist Attack with an example and show how, using certain points on the secp256k1 elliptic curve, we can get partial private key values and restore a Bitcoin Wallet within 5-15 minutes using “Sagemath pollard rho function: (discrete_log_rho)” and “ Chinese Remainder Theorem” .
Blockchain Attack Vectors & Vulnerabilities to Smart Contracts
All known physical attacks on Bitcoin and other cryptocurrencies from 2014 to 2022
We implement WhiteBox Attack on Bitcoin with differential errors according to the research scheme of Eli Biham and Adi Shamir to extract the secret key
In this article, we will apply Signature Fault Differential Analysis ECDSA and derive a private key from a transaction for five different Bitcoin Wallets.
Implement Frey-Rück Attack to get the secret key “K” (NONCE) / Critical vulnerability in the Bitcoin
Tesla BrainWallet traps from Bitcoin wallets beware of phishing and popular passphrases
Bitcoin Wallet Recovery via ECDSA Short Signatures
Reducing the private key through scalar multiplication using the ECPy + Google Colab library
Speed up secp256k1 with endomorphism
Add a description, image, and links to the attack topic page so that developers can more easily learn about it.
To associate your repository with the attack topic, visit your repo's landing page and select "manage topics."