Lianantech / Security-Vulnerabilities-Analysis-SeriesView external linksLinks
The serial analysis of different types of security vulnerabilities found in blockchain projects(关于区块链智能合约安全漏洞类型连载分析)
☆43Dec 3, 2018Updated 7 years ago
Alternatives and similar repositories for Security-Vulnerabilities-Analysis-Series
Users that are interested in Security-Vulnerabilities-Analysis-Series are comparing it to the libraries listed below
Sorting:
- iot安全题目学习记录☆16Dec 13, 2021Updated 4 years ago
- 区块链安全专题智库☆16Jun 12, 2018Updated 7 years ago
- Ethereum based smart contract vulnerability checklist (关于区块链以太坊安全类问题)☆30Oct 17, 2019Updated 6 years ago
- Updated IDA ReObjc Plugin for 7.4+ and python3☆13Apr 17, 2021Updated 4 years ago
- ☆17Mar 9, 2023Updated 2 years ago
- ☆16Dec 2, 2021Updated 4 years ago
- A set of Android binary exploitation tasks for beginners.☆29Jul 16, 2019Updated 6 years ago
- A solution for llvmvm in MRCTF2022☆11Apr 27, 2022Updated 3 years ago
- [D^3CTF 2023] pwn-d3TrustedHTTPd attachment, source code and official writeup☆10May 3, 2023Updated 2 years ago
- Python常用代码段☆11Sep 8, 2021Updated 4 years ago
- 第一期安全编写指南,主要是为了提高小密圈会员群,红日小组单独成立一个项目,来提高小伙伴Python安全编写。主要涉及安全脚本开发、POC编写、安全扫描器编写。目前内容不敢涉及太多,由于小密圈基础不统一,所以我们从基础开始做起。如果你想学习,没有组织,没有团队,那么你可以加入…☆12Dec 5, 2017Updated 8 years ago
- a java decompiler demo☆15Mar 29, 2024Updated last year
- 智能合约安全漏洞检测工具☆29Sep 11, 2023Updated 2 years ago
- ☆16Oct 15, 2024Updated last year
- ☆12May 24, 2022Updated 3 years ago
- ☆34Apr 7, 2022Updated 3 years ago
- substrate framework for android based on frida☆17May 15, 2020Updated 5 years ago
- Generate data-flow graph and def-use graph for a function based on miasm and IDA Pro.☆21May 17, 2022Updated 3 years ago
- ICCBot: A Fragment-Aware and Context-Sensitive ICC Resolution Tool for Android Applications☆43Jan 26, 2024Updated 2 years ago
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆17Sep 26, 2025Updated 4 months ago
- Binary Ninja eBPF & Solana plugin (disasm & LLIL)☆37Aug 27, 2022Updated 3 years ago
- Clear and obvious name of the exploitation technique can create a false sense of familiarity, even if its true potential was never resear…☆48Jan 3, 2026Updated last month
- Exploit code for CVE-2021-1961☆121Sep 7, 2022Updated 3 years ago
- python exp of pwnable' problems☆18Feb 5, 2024Updated 2 years ago
- A collection of resources and information about CVE-2023-2033☆19Aug 13, 2023Updated 2 years ago
- A list of data-only attacks☆21Aug 22, 2025Updated 5 months ago
- ☆20Nov 4, 2020Updated 5 years ago
- 对反fart壳的脱壳过程文件,记录于次☆26Sep 20, 2021Updated 4 years ago
- Extract call graph from apks using Flowdroid.☆20Jun 11, 2020Updated 5 years ago
- Kernel sources for the Pixel 4, Pixel 4 XL and Pixel 4a.☆19Jan 27, 2025Updated last year
- IOT Research Blog 物联网安全技术研究小组☆51Jun 20, 2018Updated 7 years ago
- Angr CTF From introduction to mastery☆152Jun 13, 2025Updated 8 months ago
- ☆24Dec 11, 2022Updated 3 years ago
- Replace gdb default history searcher and auto complete with fzf fuzzy finder☆25Apr 14, 2023Updated 2 years ago
- 《Ghidra权威指南》相关资源☆174Feb 8, 2023Updated 3 years ago
- ☆25Feb 23, 2022Updated 3 years ago
- CTF&RealWorld challenges☆26Oct 18, 2019Updated 6 years ago
- 国内外各大CTF赛题☆31Jun 30, 2023Updated 2 years ago
- 更好的包装pwntools,提高编写pwn题exp效率的工具☆27Apr 3, 2021Updated 4 years ago