Detect. Flag. Neutralize.
An independent Web3 security initiative dedicated to hunting rug pulls, exposing on-chain exploits, and protecting investors through intelligence, education, and collective action.
I entered the cryptocurrency space in 2018 like many newcomers — purchasing coins and tokens on hype, without proper due diligence. I had built a substantial portfolio when a sophisticated impersonation scam targeting a fake support account resulted in the total loss of my holdings.
That loss became the catalyst for CryptoShields. I founded the initiative to identify, expose, and eliminate fraudulent profiles while equipping the community with the knowledge to protect itself. In January 2022, my first major rug pull with RugPullMafia broadened the mission from personal recovery to proactive, industry-wide accountability and education.
What began as a solo effort has evolved into a structured movement. CryptoShields now combines rigorous rug pull investigation with comprehensive awareness campaigns across X (formerly Twitter). Our technical work includes advanced malware tracking, reverse engineering of wallet drainers, and the active shutdown of scam domains — uncovering and disrupting sophisticated threats before they cause widespread damage.
This work has grown through close collaboration with like-minded professionals I call the Shadow Warriors. Together, we operate under one unified objective: detect scams, flag them promptly, contribute to global blacklists, neutralize through technical disruption, and educate the community to foster a safer, more resilient ecosystem.
Structured database of bad actors on Crypto Twitter — tracking usernames, account IDs, and cross-scam activity. Allows persistent tracking through name changes, enabling pattern recognition across multiple fraud campaigns.
On-chain forensic database of deployer and CEX wallets linked to confirmed rug pulls and scams. Currently tracking RugPullMafia and expanding to other confirmed fraud networks for cross-wallet attribution.
Access Database →Practical OPSEC guides, red-flag identification frameworks, due diligence strategies, and risk-management principles. Equipping the next generation of crypto participants with tools to thrive — not just survive — in Web3.
Reverse engineering and technical deconstruction of wallet drainers and crypto malware. Intelligence reports distributed before threats reach critical mass — with IOCs and mitigation strategies.
Split-screen demo — left panel shows what the victim sees, right panel mirrors the attacker's console in real time. Six synced attack phases from infection to full exfiltration.
Live on-chain attack simulations on the Sepolia testnet. Players connect a burner wallet and experience real approval exploits, signature attacks, and delegate-call traps — the exact mechanics scammers use in the wild.
Five escalating levels, each demonstrating a real attack vector. Mint fake tokens, get exploited, understand exactly how it happened. The most dangerous signature you'll ever safely sign.
CryptoShields operates independently, without institutional backing. Every contribution directly funds database infrastructure, tooling, and the time invested in protecting the community. If this work has saved you from a scam — or might one day — consider supporting it.