Raz0r / defihackLinks
☆16Updated 4 years ago
Alternatives and similar repositories for defihack
Users that are interested in defihack are comparing it to the libraries listed below
Sorting:
- This is an intentionally vulnerable smart contract truffle deployment aimed at allowing those interested in smart contract security to ex…☆120Updated 6 years ago
- Some of my public exploits☆51Updated 4 years ago
- Pythonize Intruder Payload☆13Updated 4 years ago
- BlockChain-Security-List☆103Updated 7 years ago
- Dockerfile for AFL++ and helpful other tools☆21Updated 5 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Updated 2 years ago
- eXtremely fast data eXtraction via blind SQL injection☆15Updated 12 years ago
- ☆26Updated 4 years ago
- Challenges and vulnerabilities exploitation.☆59Updated 4 years ago
- Using EPUBs for the semi-automated evaluation of security and privacy implications of EPUB reading systems.☆33Updated 3 years ago
- OAuth 2.0 Dynamic Security Scanner☆33Updated 4 years ago
- A Simple command line tool that helps checking web applications to identify insecure deserialization vulnerabilities.☆24Updated 6 years ago
- CircleCI log and security configuration automations☆22Updated 4 years ago
- VyAPI - A cloud based vulnerable hybrid Android App☆85Updated 5 years ago
- My fuzzing workshop from PHDays9☆26Updated 6 years ago
- Blockchain technology has to be one of the biggest technology innovations of the past few years. The top emerging blockchain development …☆29Updated 2 years ago
- Chrome extension to detect possible xsleaks☆12Updated 6 years ago
- Simple trick to increase readability of exceptions raised by Burp extensions written in Python☆45Updated 8 years ago
- Some vulnerability research slides that I made☆12Updated 3 years ago
- A tool for auditing medical devices and healthcare infrastructure☆21Updated 2 years ago
- Evenly distributes scanner load across targets☆90Updated 4 months ago
- Scans tcl for command injection☆36Updated 6 years ago
- ☆21Updated 2 months ago
- Scripts for OSCE☆18Updated 6 years ago
- My attempt at writing exploit POCs for various CVEs☆16Updated 5 years ago
- docker-compose bringing up multiple vulnerable applications inside containers.☆19Updated 7 years ago
- Plattform to develop and experiment with existing java web attacks.☆31Updated 7 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆11Updated 4 years ago
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 2 years ago
- XXE Injection Payloads☆28Updated 6 years ago