5049504F / cryptocurrency-securityLinks
Document created to serve as a first step to learn about blockchain and smart contract security.
☆19Updated 4 years ago
Alternatives and similar repositories for cryptocurrency-security
Users that are interested in cryptocurrency-security are comparing it to the libraries listed below
Sorting:
- ☆112Updated 3 years ago
- My Blockchain auditing service☆21Updated 7 months ago
- Learn 101 is a challenge to keep the learning spirit going on and challenge myself to learn something daily for 101 days.☆30Updated 3 years ago
- ☆38Updated 3 years ago
- Collection of CTFs for Fun and Interviewing Applicants☆152Updated last year
- Learn smart contract security by hacking popular smart contract systems.☆97Updated 7 years ago
- ☆22Updated 3 years ago
- Smart Contract Security Testing Guide (SCSTG)☆17Updated 2 years ago
- ☆12Updated 4 years ago
- Blockchain Challs from HACON2020 CTF☆13Updated 4 years ago
- ☆16Updated 4 years ago
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆40Updated 3 years ago
- ☆27Updated last year
- Here we collect and discuss for Smart contract security & Blockchain researches and tools - contributions are welcome.☆95Updated 2 years ago
- CVE PoCs☆21Updated 5 years ago
- This repository provides examples of Vulnerable and Mitigated code as per CWE Categorization.☆23Updated last year
- A collection of BBRF agents that can be deployed to AWS lambda☆24Updated last year
- An app with really insecure crypto. To be used to see/test/exploit weak cryptographic implementations as well as to learn a little bit mo…☆84Updated 2 years ago
- This is an intentionally vulnerable smart contract truffle deployment aimed at allowing those interested in smart contract security to ex…☆120Updated 7 years ago
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆45Updated last year
- CircleCI log and security configuration automations☆22Updated 5 years ago
- AWS S3 open bucket poc automated script.☆57Updated 4 years ago
- ☆116Updated 2 years ago
- Find subdomains and takeovers.☆87Updated 3 years ago
- ☆243Updated last year
- Vulnerable-by-design solidity protocol to help Web3 security enthusiasts practice their skills in an environment closer to real live.☆147Updated 8 months ago
- security.txt collection of most popular world-wide domains☆55Updated 2 years ago
- Generate a dynamic PAC script that will route traffic to your Burp proxy only if it matches the scope defined in your Burp target.☆34Updated 4 years ago
- a multithreaded fast tool to preform active subdomain enumeration☆36Updated 3 years ago
- nxdomain subdomain enumeration☆10Updated 3 years ago