NZT48 / exploiting-smart-contract-vulnerabilitiesLinks
Repository for "Exploiting smart contract vulnerabilities" bachelor thesis at School of Electrical Engineering, University of Belgrade. Paper (in Serbian) with 5 examples of vulnerable smart contracts and exploitation of them.
☆10Updated 2 years ago
Alternatives and similar repositories for exploiting-smart-contract-vulnerabilities
Users that are interested in exploiting-smart-contract-vulnerabilities are comparing it to the libraries listed below
Sorting:
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆73Updated 3 years ago
- an Evil Java RMI Registry.☆51Updated 2 years ago
- ☆32Updated last year
- ☆12Updated 10 months ago
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Updated 3 years ago
- ☆95Updated 4 years ago
- tool that generates bypasses for open redirects☆52Updated 3 years ago
- Find CVEs that don't have a Detectify modules.☆22Updated 2 years ago
- Atlassian Confluence CVE-2021-26084 one-liner mass checker☆30Updated 4 years ago
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆21Updated 11 months ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆30Updated 3 years ago
- Security Advisories☆35Updated last month
- A list of threat sinks used in the manual security source code review for application security☆73Updated 2 years ago
- Generate a dynamic PAC script that will route traffic to your Burp proxy only if it matches the scope defined in your Burp target.☆34Updated 4 years ago
- A Burp Suite extension which augments your proxy traffic by injecting log4shell payloads into headers☆42Updated 4 years ago
- ☆48Updated 4 years ago
- Looking for JAR files that are vulnerable to Log4j RCE (CVE‐2021‐44228)?☆45Updated 3 years ago
- ☆12Updated 3 years ago
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆46Updated 2 years ago
- Automated HTTP Request Repeating With Burp Suite☆40Updated 2 years ago
- ☆28Updated 2 years ago
- Copy as XMLHttpRequest BurpSuite extension☆32Updated 4 years ago
- Swagger Directory Enumeration (SDE)☆20Updated 4 years ago
- Demo of various ways to exploit post based reflected XSS☆18Updated 2 years ago
- ☆23Updated 3 years ago
- Bcheck scripts for Burp☆28Updated last year
- Enhanced 403 bypass header☆21Updated 3 years ago
- 2022 CTF public release☆23Updated 3 years ago
- A cheatsheet for exploiting server-side SVG rasterization.☆30Updated 3 years ago
- Python resource library for creating security related tooling☆79Updated last year