Blockchain Hacking Payloads Database
Explore, edit and configure ready for deployment payloads for different blockchain networks and crypto coins / currencies
31 Payloads
| Name | Description | View |
|---|---|---|
| Chainshatter | Forces micro-forks across shards to destabilize consensus | |
| Gasleech | Attaches to high-gas contracts to siphon resources silently | |
| Slipstream | Injects transactions just before finalization to exploit mempool gaps | |
| Syncdrain | Degrades peer sync integrity by manipulating timestamps and headers | |
| Deadblock | Deploys silent transactions to fill blocks without economic effect | |
| Mirrortx | Duplicates real transactions with altered gas/nonce to confuse state updates | |
| Warpbridge | Targets cross-chain bridges with replayed payloads and delayed confirmations | |
| Hexrotor | Rotates through opcode exploits to cause contract entropy miscalculations | |
| Ghostmap | Stealth network mapping, node discovery | |
| Dustpulse | Deploys dust attacks for ID tracking | |
| Shadowhandshake | Spoof or intercept node handshakes to inject false nodes | |
| Nullprobe | Tests node response to malformed inputs that may cause contract failures | |
| Whisperscan | Quiet fuzzer for edge-case behavior targeting consensus issues | |
| Backscatter | Passive observation of chain broadcasts to exploit unlisted transactions | |
| Phantomping | Sends bait transactions to gauge miner behavior and exploit transaction ordering | |
| Forkfeelers | Simulates forks to break consensus and invalidate blocks | |
| Gassniff | Scans for high gas functions to identify stress points in the system | |
| Noncephantom | Monitors nonces for replay attack windows and transaction duplication | |
| Slotcrawler | Crawls storage slots for hidden variables to exploit unprotected data | |
| Echo | Echoes a transaction to test for chain fragmentation vulnerabilities | |
| Reorgbait | Injects profitable transactions near fork boundaries to trigger chain reorganization | |
| Rootdiver | Calculates historical state root variations to pinpoint revertable actions | |
| Forkbomb | Simulates a transaction flood to create heavy chain reorgs | |
| Blackflood | Amplifies gossip floods to saturate P2P overlays and choke propagation | |
| Voidcall | Deploys recursive delegatecalls to consume gas and trigger fallback traps | |
| Shadowfork | Maintains parallel hidden forks to confuse block finality | |
| Cryptomorph | Polymorphic payload mutation that rewrites opcodes on-the-fly | |
| Cache poisoning | Poisoning of state cache | |
| Etherblight | Starves execution pipelines by targeting gas refund mechanics | |
| Spectresync | Creates phantom nodes that echo peer lists to desync topology maps | |
| Glitchpulse | Periodic disruption pulses that induce chain stalls at random intervals |