Niflheim World

Welcome to Niflheim !

  • First 5 messages from new users (pre-moderated user) will be checked for flood/spam before being posted on the forum. Users will also be checked for a multi-account.
    If you want to communicate without delay, get a free Huscarl status (how to get - User Groups), or buy premium status (how to buy - Premium status)

Sell [Quark Drainer] Seaport 1.5 | Blur&X2Y2 | Fix metamask | Permit 2 | Smart Contract


quarkdev

Knows Victoria's secret
Huscarl
Joined
May 26, 2023
Messages
26
Reaction score
6
Location
Munich
NL COIN
117
Sorry for the absence from the forum, are you ready for the updates?

- Added OpenSea API v2 for searching NFTs
- Fixed optimism network operation
- It's now possible to set the percentage of gas the drainer leaves on the victim's wallet.
- It is now possible to disable token scanning via the native evaluator to reduce scanning time.
- Changed Create2 bypass logic to optimise server resources
- Added Create2 method support for NFT transfer and SAFA output methods.
- Other minor improvements and fixes to issues found in version 02.2024

Ready for the big news?
Coming soon...
 

quarkdev

Knows Victoria's secret
Huscarl
Joined
May 26, 2023
Messages
26
Reaction score
6
Location
Munich
NL COIN
117
We are pleased to announce that the Quark Drainer has gained a set of new features that allow it to effectively bypass transaction simulators such as WalletGuard and Pocket Universe.

This is achieved by overriding the request to redirect the target's RPC calls and hiding the current interaction from targeted anti-phishing tools. This can render transaction simulators ineffective as a defence against Quark Drainer in such scenarios, as these tools will not be able to detect the drainer unless the domain of the phishing site is explicitly blacklisted.

Another method used to bypass the security measures of wallet protection tools such as BlockAid is to generate untagged contract addresses if the value of the stolen assets exceeds a predetermined minimum threshold. This approach is effective because it differs from the typical approach of simply simulating a pending transaction. Instead, BlockAid checks to see if a known malicious address is involved in the transaction.
 
shape1
shape2
shape3
shape4
shape7
shape8
Top