NZT48 / exploiting-smart-contract-vulnerabilitiesLinks
Repository for "Exploiting smart contract vulnerabilities" bachelor thesis at School of Electrical Engineering, University of Belgrade. Paper (in Serbian) with 5 examples of vulnerable smart contracts and exploitation of them.
☆10Updated 2 years ago
Alternatives and similar repositories for exploiting-smart-contract-vulnerabilities
Users that are interested in exploiting-smart-contract-vulnerabilities are comparing it to the libraries listed below
Sorting:
- ☆34Updated last year
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆73Updated 3 years ago
- an Evil Java RMI Registry.☆51Updated 3 years ago
- Find CVEs that don't have a Detectify modules.☆22Updated 2 years ago
- A cheatsheet for exploiting server-side SVG rasterization.☆30Updated 3 years ago
- ☆95Updated 4 years ago
- Security Advisories☆35Updated 3 months ago
- Automated HTTP Request Repeating With Burp Suite☆40Updated 2 years ago
- tool that generates bypasses for open redirects☆52Updated 3 years ago
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Updated 2 years ago
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Updated 4 years ago
- Bcheck scripts for Burp☆28Updated last year
- Python resource library for creating security related tooling☆79Updated last year
- ☆12Updated last year
- Tests for LFI in PHP apps and automates the process of leveraging LFI's to recursively download source code and discover new files via in…☆13Updated 3 years ago
- Query various sources for CVE proof-of-concepts☆53Updated 2 years ago
- Subdomain finder☆10Updated 10 months ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Updated 4 years ago
- Atlassian Confluence CVE-2021-26084 one-liner mass checker☆30Updated 4 years ago
- ☆41Updated 2 years ago
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆14Updated 4 years ago
- A Burp Suite extension which augments your proxy traffic by injecting log4shell payloads into headers☆42Updated 4 years ago
- An intentionally-vulnerable application for demonstrating the hazards of SpEL expression composition☆28Updated 7 years ago
- ☆12Updated 3 years ago
- A collection of utilities for building extensions using Burp's Montoya API☆52Updated 3 months ago
- ☆48Updated 4 years ago
- CVE PoCs☆21Updated 5 years ago
- A collection of Burp Suite Lambda Filters ~ Bambdas☆30Updated last year
- ☆21Updated 5 months ago
- Bugbounty utility to store list of enumerated subdomains into an sqlite3 db [one liner style / Pipe and save]☆29Updated 5 years ago