Barefoot-Dev / solidity-nft-boilerplateLinks
A boilerplate for developing, testing and deploying smart contracts using Hardhat and Ethers.js
☆19Updated 3 years ago
Alternatives and similar repositories for solidity-nft-boilerplate
Users that are interested in solidity-nft-boilerplate are comparing it to the libraries listed below
Sorting:
- Notification webhook for GoPhish☆55Updated last year
- ☆110Updated 2 years ago
- Locate intersting files in grayhatwarfare.com open S3 buckets and Azure blobs automatically!☆29Updated 3 years ago
- RopstenCtf is an easy tool to interact with the ethereum ropsten network for ctf purpose and more.☆17Updated 3 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆34Updated 4 years ago
- an Evil Java RMI Registry.☆51Updated 2 years ago
- Talk slides and material☆33Updated last year
- Automated compromise detection of the world's most popular packages☆17Updated 2 years ago
- A blazing fast, high performance implementation of AutoRecon in Rust. A multi-threaded network reconnaissance tool which performs automa…☆43Updated 9 months ago
- A swiss army knife for pentesting networks☆26Updated 3 years ago
- A C# Tool to find left over pentest data for use in your pentest or redteam op. Blue could maybe use to find files to cleanup☆39Updated 2 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 3 years ago
- Discord C2 Profile for Mythic☆32Updated 8 months ago
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆14Updated 3 years ago
- Exploits written while preparing for the OSED exam☆25Updated last year
- ChatGPT queries via OpenAI API in your terminal☆62Updated 2 years ago
- Microsoft365 Device Code Phishing Framework☆38Updated 4 years ago
- WMI SA stuffs☆30Updated 3 years ago
- Monitor your target continuously for new subdomains!☆24Updated 2 years ago
- Cisco Unfied Call Manager enumeration☆25Updated 3 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated 2 years ago
- Distributed phishing framework designed to streamline offensive security phishing☆41Updated 2 years ago
- Red Team Projects with chat.openai.com.☆17Updated 2 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 3 years ago
- A Sigma based detection pipeline☆12Updated last year
- ☆37Updated 2 years ago
- Modified version of PEAS client for offensive operations☆42Updated 2 years ago
- Another tool for exploiting CVE-2017-9248, a cryptographic weakness in Telerik UI for ASP.NET AJAX dialog handler.☆56Updated last year
- Most common AWS S3 bucket names.☆27Updated 5 years ago
- ☆21Updated 11 months ago