Nyx: Detecting Exploitable Front-Running Vulnerabilities in Smart Contracts
☆21May 11, 2024Updated last year
Alternatives and similar repositories for Nyx
Users that are interested in Nyx are comparing it to the libraries listed below
Sorting:
- ☆17Sep 4, 2024Updated last year
- MCPCorpus is a comprehensive dataset for analyzing the Model Context Protocol (MCP) ecosystem, containing ~14K MCP servers and 300 MCP cl…☆32Sep 1, 2025Updated 6 months ago
- Smart contract front-running vulnerability benchmark☆25Dec 11, 2023Updated 2 years ago
- ☆27Aug 28, 2024Updated last year
- Siren: Byzantine-robust Federated Learning via Proactive Alarming (SoCC '21)☆11Mar 28, 2024Updated last year
- LLAP is an LLVM-based tool for generating enriched program dependency graphs (ePDGs) from program source code that are suitable for use i…☆16May 17, 2023Updated 2 years ago
- ☆39Jun 23, 2025Updated 8 months ago
- A framework to quantify Web3-based browser fingerprinting and wallet address leakage (USENIX 2023).☆13Aug 8, 2023Updated 2 years ago
- 4.9 Kernel Exploit for CVE-2020-27786☆10Dec 3, 2022Updated 3 years ago
- ☆19Jan 31, 2023Updated 3 years ago
- ☆15Dec 29, 2023Updated 2 years ago
- Translate Python and JavaScript into MLIR☆17Aug 27, 2022Updated 3 years ago
- EaTVul: ChatGPT-based Evasion Attack Against Software Vulnerability Detection☆18Jan 6, 2025Updated last year
- AI-powered web scraper for harvesting and analyzing Computing Research Association job listings.☆19Sep 14, 2024Updated last year
- [NDSS'23] BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense☆17May 7, 2024Updated last year
- Official Implementation of NeurIPS 2024 paper - BiScope: AI-generated Text Detection by Checking Memorization of Preceding Tokens☆28Feb 17, 2026Updated 2 weeks ago
- Fuzzing framework to target native components of android applications☆22Oct 22, 2022Updated 3 years ago
- ☆21Apr 17, 2023Updated 2 years ago
- Implementation of "Physical Attack on Monocular Depth Estimation with Optimal Adversarial Patches"☆25Aug 31, 2022Updated 3 years ago
- ICSE'24 GPTScan: Detecting Logic Vulnerabilities in Smart Contracts by Combining GPT with Program Analysis☆94Dec 11, 2024Updated last year
- ☆26Nov 8, 2023Updated 2 years ago
- Source code of a few LLVM passes that I wrote to learn and that now I am sharing for my LLVM course for security engineering☆28Sep 16, 2022Updated 3 years ago
- CVE-2022-2586: Linux kernel nft_object UAF☆20Sep 3, 2022Updated 3 years ago
- GrayC: Greybox Fuzzing of Compilers and Analysers for C☆62Jan 28, 2026Updated last month
- 🥇 Amazon Nova AI Challenge Winner - ASTRA emerged victorious as the top attacking team in Amazon's global AI safety competition, defeati…☆70Aug 14, 2025Updated 6 months ago
- ☆27Mar 16, 2023Updated 2 years ago
- ☆25Feb 6, 2024Updated 2 years ago
- A symbolic execution engine for EVM smart contract binaries.☆118Dec 2, 2025Updated 3 months ago
- ☆26May 10, 2021Updated 4 years ago
- ☆34Aug 28, 2024Updated last year
- FLOWMATRIX: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation, USENIX Security'22☆28Apr 17, 2023Updated 2 years ago
- Code for AAAI 2021 "Towards Feature Space Adversarial Attack".☆30Aug 24, 2021Updated 4 years ago
- [Oakland 2024] Exploring the Orthogonality and Linearity of Backdoor Attacks☆27Apr 15, 2025Updated 10 months ago
- some kernel exploit challenges and cve analysis☆26Nov 30, 2018Updated 7 years ago
- EF/CF - Extremely Fast smart Contract Fuzzing☆70Jul 11, 2023Updated 2 years ago
- TVMFuzz: fuzzing tensor-level intermediate representation in TVM☆30May 24, 2020Updated 5 years ago
- Genetic program repair using GHC☆33May 16, 2024Updated last year
- Write your own exploit for $CASH☆26Jun 16, 2022Updated 3 years ago
- Repo for colecting all my public CTF challenges☆28Dec 23, 2024Updated last year