The serial analysis of different types of security vulnerabilities found in blockchain projects(关于区块链智能合约安全漏洞类型连载分析)
☆43Dec 3, 2018Updated 7 years ago
Alternatives and similar repositories for Security-Vulnerabilities-Analysis-Series
Users that are interested in Security-Vulnerabilities-Analysis-Series are comparing it to the libraries listed below
Sorting:
- 区块链安全专题智库☆16Jun 12, 2018Updated 7 years ago
- Updated IDA ReObjc Plugin for 7.4+ and python3☆13Apr 17, 2021Updated 4 years ago
- ☆16Dec 2, 2021Updated 4 years ago
- ☆17Mar 9, 2023Updated 3 years ago
- [D^3CTF 2023] pwn-d3TrustedHTTPd attachment, source code and official writeup☆10May 3, 2023Updated 2 years ago
- Python常用代码段☆11Sep 8, 2021Updated 4 years ago
- 第一期安全编写指南,主要是为了提高小密圈会员群,红日小组单独成立一个项目,来提高小伙伴Python安全编写。主要涉及安全脚本开发、POC编写、安全扫描器编写。目前内容不敢涉及太多,由于小密圈基础不统一,所以我们从基础开始做起。如果你想学习,没有组织,没有团队,那么你可以加入…☆12Dec 5, 2017Updated 8 years ago
- a java decompiler demo☆15Mar 29, 2024Updated last year
- 智能合约安全漏洞检测工具☆29Sep 11, 2023Updated 2 years ago
- 区块链安全学习资料汇总☆31Jun 10, 2021Updated 4 years ago
- ☆13Mar 15, 2022Updated 3 years ago
- ☆12May 24, 2022Updated 3 years ago
- An educational toy fuzzer with big dreams☆12Dec 12, 2023Updated 2 years ago
- substrate framework for android based on frida☆17May 15, 2020Updated 5 years ago
- ICCBot: A Fragment-Aware and Context-Sensitive ICC Resolution Tool for Android Applications☆43Jan 26, 2024Updated 2 years ago
- Binary Ninja eBPF & Solana plugin (disasm & LLIL)☆37Aug 27, 2022Updated 3 years ago
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆17Sep 26, 2025Updated 5 months ago
- Generate data-flow graph and def-use graph for a function based on miasm and IDA Pro.☆22May 17, 2022Updated 3 years ago
- iOS逆向笔记☆18Dec 17, 2023Updated 2 years ago
- Exploit code for CVE-2021-1961☆121Sep 7, 2022Updated 3 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆18Jul 1, 2020Updated 5 years ago
- A list of data-only attacks☆21Aug 22, 2025Updated 6 months ago
- Writeup for Move CTF 2022 by MoveBit and others.☆18Nov 9, 2022Updated 3 years ago
- A collection of resources and information about CVE-2023-2033☆19Aug 13, 2023Updated 2 years ago
- A collection of resources/tools and analyses for the angr binary analysis framework.☆186Jul 28, 2022Updated 3 years ago
- 对反fart壳的脱壳过程文件,记录于次☆26Sep 20, 2021Updated 4 years ago
- ☆20Nov 4, 2020Updated 5 years ago
- Extract call graph from apks using Flowdroid.☆20Jun 11, 2020Updated 5 years ago
- log4j-patch 修改字节码实现补丁防御☆20Dec 10, 2021Updated 4 years ago
- Kernel sources for the Pixel 4, Pixel 4 XL and Pixel 4a.☆19Jan 27, 2025Updated last year
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆49Jan 6, 2017Updated 9 years ago
- IOT Research Blog 物联网安全技术研究小组☆51Jun 20, 2018Updated 7 years ago
- ☆24Dec 11, 2022Updated 3 years ago
- Replace gdb default history searcher and auto complete with fzf fuzzy finder☆25Apr 14, 2023Updated 2 years ago
- Angr CTF From introduction to mastery☆153Jun 13, 2025Updated 8 months ago
- archive of the released challenges from corCTF 2021☆25Sep 20, 2021Updated 4 years ago
- ☆25Feb 23, 2022Updated 4 years ago
- Rethinking Smart Contract Fuzzing: Fuzzing With Invocation Ordering and Important Branch Revisiting (TIFS Accepted).☆50Feb 28, 2023Updated 3 years ago
- 《Ghidra权威指南》相关资源☆174Feb 8, 2023Updated 3 years ago