Ethical hacking practices used to explore vulnerabilities in smart contracts, in order to enhance security measures against potential threats.
☆26Jan 8, 2024Updated 2 years ago
Alternatives and similar repositories for Hacking-Smart-Contracts
Users that are interested in Hacking-Smart-Contracts are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Proof of concept : CVE-2024-1071: WordPress Vulnerability Exploited☆22Aug 30, 2024Updated last year
- WpDisect is a wordpress hacking tool that finds vulnerabilities in wordpress.☆14Feb 20, 2022Updated 4 years ago
- Automatically exported from code.google.com/p/pweb-suite☆14Jun 8, 2016Updated 9 years ago
- Blockchain Attack Vectors & Vulnerabilities to Smart Contracts☆35Dec 27, 2022Updated 3 years ago
- solidity smart-contract CTFs and wargames solved for fun and profit☆14Mar 1, 2020Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- GiveWP PHP Object Injection exploit☆12Oct 1, 2024Updated last year
- Find secrets and passwords in container images and file systems☆15Nov 16, 2022Updated 3 years ago
- 🍭 Web Application Vulnerability Scanner 🍭☆16May 21, 2022Updated 3 years ago
- PathCoin (transfer bitcoin without network interaction) - proof of concept demonstration☆10Nov 19, 2023Updated 2 years ago
- A set of tools, procedures, and playbooks for performing bug bounties☆18Dec 2, 2018Updated 7 years ago
- ☆11Mar 19, 2020Updated 6 years ago
- The PCI DSS Compliance Toolkit is an open-source project aimed at helping organizations achieve and maintain compliance with the (PCI DS…☆20Dec 13, 2023Updated 2 years ago
- Uniswap V2 contracts, ready to be deployed to local or test network☆15Apr 28, 2022Updated 4 years ago
- Minimalistic Keyboard Driven Browser 🌐🎀☆14May 21, 2025Updated 11 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A minimalist microblogging platform 🐦🔇☆10Apr 21, 2026Updated 2 weeks ago
- BSides, OWASP, DEFCON, RSAC, SANS Talk Material, References and Extra Bits☆14Jul 19, 2025Updated 9 months ago
- Black Hat Ethical Hacking | PHP Backdoor Shell v1.0☆20May 22, 2018Updated 7 years ago
- AI web vulneraribilty scanner 🤖☆21Feb 22, 2024Updated 2 years ago
- This Tool is for web penetration Testing.☆21Jan 10, 2021Updated 5 years ago
- ☆13Nov 29, 2024Updated last year
- This is the repo for Taskfile demo☆12Aug 10, 2024Updated last year
- Exfiltrate data using ping and PowerShell, no admin access required☆15Mar 26, 2024Updated 2 years ago
- List of bug bounty programs of companies/organisations in Switzerland☆13Oct 28, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A list of universities with vulnerability disclosure policies☆13Jul 10, 2020Updated 5 years ago
- Universal prompt for Power users 💪🌈☆23Apr 18, 2026Updated 3 weeks ago
- Mass deface's 1500 website☆17Feb 8, 2023Updated 3 years ago
- Web Help Desk Hardcoded Credential Vulnerability (CVE-2024-28987)☆12Sep 5, 2024Updated last year
- A tool for Oragnized ASM (Attack Surface Mapper). Subdomains enumeration, IPs scans, Vulnerability assesment...☆38Sep 11, 2023Updated 2 years ago
- XSS PoCs to elevate your alert()☆23May 18, 2023Updated 2 years ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆44Apr 9, 2022Updated 4 years ago
- This is a phishing ready platform. Unlike other phishing methods, EvilnoVNC allows you to bypass 2FA using a real browser via noVNC conn…☆10Apr 7, 2023Updated 3 years ago
- <BLACKHAT> Generates CCN|{day}/{year}|{CVV} *** FOR EDUCATIONAL …☆38Jun 25, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Ethical Hacking Roadmap 🌐🔒☆11Dec 19, 2023Updated 2 years ago
- e2e Scanning research module☆25Mar 26, 2026Updated last month
- ☆17Nov 29, 2025Updated 5 months ago
- Google Dorks and keywords for bug hunters.☆15Aug 16, 2021Updated 4 years ago
- Solutions for DamnVulnerableDefi, a smart-contract based CTF Challenge☆12Dec 22, 2022Updated 3 years ago
- Scalable URL obfuscator service☆11Feb 14, 2023Updated 3 years ago
- BitTorrent DHT Protocol && DHT Spider,faster than shiyanhui/dht☆12Aug 30, 2023Updated 2 years ago