Marsh61 / ECDSA-Nonce-Reuse-Exploit-ExampleLinks
This code shows how you can extract a ECDSA private key from two messages signed with the same K value. Every signature must have been singed with a unique K value otherwise this attack is possible.
☆33Updated 7 years ago
Alternatives and similar repositories for ECDSA-Nonce-Reuse-Exploit-Example
Users that are interested in ECDSA-Nonce-Reuse-Exploit-Example are comparing it to the libraries listed below
Sorting:
- https://rinkeby.etherscan.io/address/0xffb9205c84d0b209c215212a3cdfc50bf1cfb0e0#code☆40Updated 3 years ago
- ☆13Updated 3 weeks ago
- Beating OpenZeppelin's Ethernaut in Pure Assembly. Masochists Only.☆24Updated 2 years ago
- Efficient beacon chain batch deposit contract written in huff☆22Updated 2 years ago
- Eth mempool history☆31Updated 3 years ago
- ☆27Updated 2 years ago
- A repo to for sharing information on Substrate security☆20Updated last year
- A cli version of the Nomad Sparse Merklee Tree Accumulator☆19Updated 3 years ago
- ☆16Updated last year
- Exploring mempool listening methods☆25Updated 3 years ago
- ☆15Updated 2 years ago
- A vscode extension that copies huff's code stack comment and paste in the next line, making it easy for Huffooors to write opcodes w/o wo…☆14Updated last year
- A blazing-fast helper library for convenient Solidity dynamic arrays☆42Updated last year
- Example of the whitehack for Curve exploit 30/07/23☆19Updated 2 years ago
- ☆34Updated 3 years ago
- ☆40Updated 5 years ago
- A flashloan module for Gnosis Safe.☆45Updated 4 years ago
- Ethernaut, but in Huff☆28Updated 2 years ago
- A king-of-the-hill style competition, where players optimize gas challenges.☆21Updated last year
- Gas golfing the most gas efficient way to check if two integers have the same sign in Solidity☆46Updated 3 years ago
- ☆20Updated 4 years ago
- Testing Ethereum reorgs in a private geth network☆29Updated 3 years ago
- 😵💫 A Recurrent Neural Network (RNN) hallucinating solidity source code.☆42Updated 4 years ago
- EIP-3074 (Batch) transaction invoker, which can send multiple transactions in a single call☆35Updated 2 years ago
- ☆18Updated 3 years ago
- Presentation materials from (Defense Against) The Dark Arts - Contract Runtime Mutability at Devcon V in Osaka☆36Updated 6 years ago
- A reentrancy attack on the Deadfrenz Lab Pass contract☆19Updated 3 years ago
- Assembly implementation of EIP-4788 system contract.☆24Updated last year
- An NFT with Huff, using polynomials over a finite field with order largest prime address, instead of mappings.☆16Updated last year
- ☆18Updated 3 years ago