Smart Contract Security Testing Guide (SCSTG)
☆17Aug 23, 2023Updated 2 years ago
Alternatives and similar repositories for SCSTG
Users that are interested in SCSTG are comparing it to the libraries listed below
Sorting:
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Apr 30, 2021Updated 4 years ago
- ☆17Aug 3, 2025Updated 6 months ago
- Smart Contract Security Review + Test Coverage + Eth Gas Report☆12Jan 24, 2023Updated 3 years ago
- ☆21Sep 12, 2025Updated 5 months ago
- Certora's Formal Verification and Audit Portfolio – a comprehensive collection of smart contract security verification reports and audits…☆30Jan 13, 2026Updated last month
- a useful utility for android app security testing☆92May 25, 2025Updated 9 months ago
- Halmos vs Damn Vulnerable DeFi is the series of articles about solving the Damn Vulnerable DeFi CTF using the Halmos symbolic analyzer.☆33Feb 25, 2025Updated last year
- Collection of powershell scripts I used to complete my CARTP and CARTE courses.☆49Updated this week
- ☆32Jun 1, 2024Updated last year
- Write your own exploit for $CASH☆26Jun 16, 2022Updated 3 years ago
- Security information and event management, masters's diploma☆10Aug 3, 2015Updated 10 years ago
- Coalfire GCP RAMP/pak Reference Architecture☆13Feb 5, 2026Updated 3 weeks ago
- This bash script tool, will perform advanced subdomain enumeration, save the results, it will then probe the subdomains into urls, save t…☆25Sep 6, 2024Updated last year
- Promon Shield String Deobfuscator☆44Dec 31, 2025Updated 2 months ago
- A guide on smart contract patterns & practices☆30Aug 7, 2020Updated 5 years ago
- User-friendly reference finder in IDA☆39Dec 17, 2022Updated 3 years ago
- NIST transition-edge sensor (TES) data acquisition framework☆16Updated this week
- ☆13Aug 28, 2025Updated 6 months ago
- An full-stack eCommerce store web application in nodejs☆11Jun 6, 2024Updated last year
- This is a templated to be used for QRL Jacking Sessions (Tested on Chrome,brave & firefox )☆13Feb 26, 2022Updated 4 years ago
- Build a project with Express.js☆11Jan 31, 2021Updated 5 years ago
- The C-Agent is a reference implementation of a Keyfactor Orchestrator geared toward use in IoT based solutions.☆12Aug 28, 2025Updated 6 months ago
- ☆11Aug 18, 2022Updated 3 years ago
- Akira Bot adalah Bot Whatsapp yg Memiliki 500+ Fitur, dan Menggunakan Bermacam² Rest Api☆10Apr 6, 2021Updated 4 years ago
- Material of my talk/workshop "Smart contracts and Hacking 101"☆10Mar 31, 2025Updated 11 months ago
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- A general repository for all projects used for the Tiny Kotlin Project Book☆11Feb 27, 2023Updated 3 years ago
- ☆38Feb 11, 2022Updated 4 years ago
- Solidity Cookbook - Examples on how to code smart contracts for Ethereum.☆32Apr 4, 2021Updated 4 years ago
- Notes, Lab Commands and Vulnerability Information for BSCP Exam Prep☆49Jun 7, 2023Updated 2 years ago
- iOS binary memory dump tool for iOS15+ (rootful, rootless)☆51Jan 15, 2024Updated 2 years ago
- Sample Contracts used on the FusedVR Channel☆10Nov 7, 2021Updated 4 years ago
- PowerShell Module for Extrahop☆15Dec 13, 2018Updated 7 years ago
- HnuSec 海南大学网安实验室☆13Jan 30, 2024Updated 2 years ago
- Getting started guides to deploy the SIGHUP Distribution (SD) in different environments☆15Updated this week
- The SDK Example to control robot product of nuwarobotics.☆11Nov 7, 2024Updated last year
- Me and my team hack accounts for players of Prodigy Math Game that only have access to a mobile device/people who can't hack themselves.☆15Feb 4, 2022Updated 4 years ago
- ☆13Feb 20, 2023Updated 3 years ago
- This is a script to import Cisco Talos's IP Blacklist into a Tag (Host Group) within Stealthwatch. This will also optionally create a Cu…☆11May 22, 2023Updated 2 years ago