The serial analysis of different types of security vulnerabilities found in blockchain projects(关于区块链智能合约安全漏洞类型连载分析)
☆44Dec 3, 2018Updated 7 years ago
Alternatives and similar repositories for Security-Vulnerabilities-Analysis-Series
Users that are interested in Security-Vulnerabilities-Analysis-Series are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- iot安全题目学习记录☆17Dec 13, 2021Updated 4 years ago
- Updated IDA ReObjc Plugin for 7.4+ and python3☆13Apr 17, 2021Updated 5 years ago
- Dice CTF 2022 breach write-up☆15Feb 14, 2022Updated 4 years ago
- ☆17Mar 9, 2023Updated 3 years ago
- A set of Android binary exploitation tasks for beginners.☆29Jul 16, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A solution for llvmvm in MRCTF2022☆11Apr 27, 2022Updated 4 years ago
- 智能合约安全漏洞检测工具☆29Sep 11, 2023Updated 2 years ago
- Python常用代码段☆11Sep 8, 2021Updated 4 years ago
- a java decompiler demo☆15Mar 29, 2024Updated 2 years ago
- 第一期安全编写指南,主要是为了提高小密圈会员群,红日小组单独成立一个项目,来提高小伙伴Python安全编写。主要涉及安全脚本开发、POC编写、安全扫描器编写。目前内容不敢涉及太多,由于小密圈基础不统一,所以我们从基础开始做起。如果你想学习,没有组织,没有团队,那么你可以加入…☆12Dec 5, 2017Updated 8 years ago
- substrate framework for android based on frida☆17May 15, 2020Updated 5 years ago
- ☆13Mar 15, 2022Updated 4 years ago
- Jswap (Jswap.Finance) is a decentralized transaction and wealth management protocol based on OKExChain. It supports swap mining, liquidit…☆12Jun 27, 2022Updated 3 years ago
- Endpoint enumeration☆11Apr 1, 2022Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- 区块链安全学习资料汇总☆31Jun 10, 2021Updated 4 years ago
- Writeup for Move CTF 2022 by MoveBit and others.☆18Nov 9, 2022Updated 3 years ago
- ☆11Dec 28, 2021Updated 4 years ago
- A Sequence Learning Approach to Detecting Vulnerabilities☆48Nov 17, 2021Updated 4 years ago
- ☆13Jan 5, 2021Updated 5 years ago
- ☆12May 24, 2022Updated 3 years ago
- ☆11May 16, 2021Updated 4 years ago
- ☆13Sep 28, 2020Updated 5 years ago
- 对反fart壳的脱壳过程文件,记录于次☆26Sep 20, 2021Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- iOS逆向笔记☆19Dec 17, 2023Updated 2 years ago
- Rethinking Smart Contract Fuzzing: Fuzzing With Invocation Ordering and Important Branch Revisiting (TIFS Accepted).☆50Feb 28, 2023Updated 3 years ago
- [D^3CTF 2023] pwn-d3TrustedHTTPd attachment, source code and official writeup☆10May 3, 2023Updated 3 years ago
- ☆34Apr 7, 2022Updated 4 years ago
- ☆11May 30, 2024Updated last year
- Binary Ninja eBPF & Solana plugin (disasm & LLIL)☆37Aug 27, 2022Updated 3 years ago
- Evaluation Results for the Paper "EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts"☆13May 28, 2021Updated 4 years ago
- 一个可扩展的智能合约安全审计工具☆13Oct 13, 2020Updated 5 years ago
- Smart Sync enables the creation of smart contract forks and verifiable synchronization across EVM-compatible blockchain networks.☆13Jan 6, 2023Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆16Jan 9, 2022Updated 4 years ago
- Exploit code for CVE-2021-1961☆122Sep 7, 2022Updated 3 years ago
- An educational toy fuzzer with big dreams☆12Dec 12, 2023Updated 2 years ago
- A collection of resources/tools and analyses for the angr binary analysis framework.☆186Jul 28, 2022Updated 3 years ago
- ☆24Dec 11, 2022Updated 3 years ago
- Sher's crypto library☆10Jan 12, 2021Updated 5 years ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆48Jan 6, 2017Updated 9 years ago