☆18Mar 18, 2026Updated this week
Alternatives and similar repositories for audit-reports
Users that are interested in audit-reports are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python based Web Scraper which can discover JavaScript files and parse them for juicy information (API keys, IP's, Hidden Paths etc)☆16Feb 17, 2022Updated 4 years ago
- ☆14Dec 31, 2025Updated 2 months ago
- ☆11Jan 18, 2022Updated 4 years ago
- ☆19Oct 24, 2024Updated last year
- OWASP Smart Contract Securty Verification Standard☆17Aug 20, 2025Updated 7 months ago
- Tools for security researchers at Code4rena.com☆14Jan 5, 2026Updated 2 months ago
- Writeup for Move CTF 2022 by MoveBit and others.☆18Nov 9, 2022Updated 3 years ago
- ☆11Oct 10, 2025Updated 5 months ago
- ☆10Jun 17, 2025Updated 9 months ago
- Jupyter notebooks for the code samples of the book "Deep Learning with Python"☆17Jul 5, 2018Updated 7 years ago
- ☆33Oct 10, 2025Updated 5 months ago
- ☆10Jun 17, 2025Updated 9 months ago
- ☆31Nov 8, 2024Updated last year
- A Deep Learning Augmented Large Language Model Prompting Framework for Software Vulnerability Detection☆23Oct 8, 2024Updated last year
- An online Lab Manual for all the CSE students of DSCE, however it can be used by anyone with an interest in computers.☆16Jul 22, 2020Updated 5 years ago
- 以太坊单合约交易调试工具☆16Jul 20, 2021Updated 4 years ago
- ☆11Nov 18, 2022Updated 3 years ago
- ☆12Sep 19, 2022Updated 3 years ago
- most easy way to swap between USDx and stable coins.☆15Jan 5, 2023Updated 3 years ago
- Binius implementation in a series of Python Jupyter Notebooks, for pedagogic purposes.☆12May 27, 2024Updated last year
- A Blockchain And Smart Contract Based CTF☆17Jul 25, 2023Updated 2 years ago
- ☆17Aug 15, 2023Updated 2 years ago
- DolphinChain is the first Vulnerable Blockchain Application in the world!☆16Apr 23, 2019Updated 6 years ago
- TCP SYN Flood DDoS Detection using Machine Learning☆21Mar 10, 2022Updated 4 years ago
- ☆13Oct 17, 2021Updated 4 years ago
- GH Scanner Tool is written in Python3 and designed for penetration testers and bug bounty hunters to scan Organization/User repositories …☆34Jul 13, 2025Updated 8 months ago
- This repository introduces our research in source code verifier, including PoC, related issues implementation code and other content.☆23Sep 29, 2023Updated 2 years ago
- ☆44Dec 8, 2024Updated last year
- cuZK: An Efficient GPU Implemetation of zkSNARK☆39Sep 19, 2023Updated 2 years ago
- Solstice is a security analysis framework for investigative smart contract examination. The first prototype of Solstice, code named W18 (…☆20Jan 13, 2019Updated 7 years ago
- ☆19Feb 26, 2021Updated 5 years ago
- ☆23Nov 29, 2020Updated 5 years ago
- ☆21Nov 23, 2020Updated 5 years ago
- ⚡ Create TON dApps with the speed of a foton☆52Aug 24, 2025Updated 7 months ago
- The NEST Oracle Smart Contract 3.6 is a solidity smart contract implementation of NEST Protocol which provide a unique on-chain Price Ora…☆15May 4, 2022Updated 3 years ago
- ☆102Mar 24, 2022Updated 4 years ago
- State-of-the-art about program verification on Ethereum DApps☆22Dec 6, 2023Updated 2 years ago
- Discover grants, fellowships, cloud credits, and research funding for PhDs, postdocs, OSS maintainers, and indie developers.☆33Nov 18, 2025Updated 4 months ago
- Flutter SSL pinning bypass using IP forwarding☆48Feb 15, 2026Updated last month