Hackless Docs
WebsiteTelegramTwitterDiscord
  • 📁General
    • 🟨Intro
    • 🟨Mempool
      • ◽Introduction
      • ◽Transaction flow
      • ◽Transaction time
      • ◽Role of Hackless
    • 🟨Types of Transactions
    • 🟨MEV
      • ◽Introduction
      • ◽MEV process
      • ◽Downsides MEV
      • ◽Role of Hackless
  • 📂Products
    • ✳️Wallet Rescue
      • 🟨Intro
      • 🟨Types of transactions
        • ◽Native Token Transfer
        • ◽Token Transfer
        • ◽NFT: ERC-721/ERC-1155
        • ◽HEX Data Tx
        • ◽Signed Raw Tx
      • 🟨Basic flow
      • 🟨Payments
    • ✳️RPG Bot
      • 🟨Intro
      • 🟨Setting up the bot
      • 🟨Monitoring and detection
      • 🟨RPG response example
    • ✳️Anti-Sandwich
      • 🟨Intro
      • 🟨Basic flow
      • 🟨Payment transaction
      • 🟨Swap settings
      • 🟨Custom tokens
      • ❗Troubleshooting
        • ▫️Token not found
        • ▫️Insufficient liquidity
        • ▫️Insufficient asset balance
        • ▫️The price is unknown
        • ▫️Processing transaction error
Powered by GitBook
On this page
  1. Products

Wallet Rescue

Save assets from the compromised wallets

PreviousRole of HacklessNextIntro

Last updated 1 year ago

Get your funds out of hacked or compromised wallets with ease. Utilize Wallet Rescue's advanced security features to seamlessly, privately and securely transfer your assets, outsmarting any malicious bots and safeguarding your digital wealth.

📂
✳️
🟨Intro
🟨Types of transactions
🟨Basic flow
🟨Payments