Foundry-like interface for interacting with the Ethereum application in python with extra features for solving CTF Challenges using the web3 module
☆42Jul 31, 2025Updated 8 months ago
Alternatives and similar repositories for foundpy
Users that are interested in foundpy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository contains the setup from Paradigm CTF blockchain challenges based on the original repository. We've introduced new featur…☆48Oct 4, 2025Updated 6 months ago
- A repo about CTF challenges that I made at several CTF events☆14Mar 20, 2025Updated last year
- TEAM BAY'S CTF WRITE UP☆24Mar 19, 2025Updated last year
- gemastik-xvii-final public repository☆23Oct 24, 2024Updated last year
- Plaguards: Open Source PowerShell Deobfuscation and IOC Detection Engine for Blue Teams. [Presented at Black Hat Asia and USA 2025 Arsena…☆17Jan 4, 2026Updated 3 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- :)☆12Mar 24, 2021Updated 5 years ago
- CVE-2023-46818 IPSConfig Python exploit☆17Oct 8, 2024Updated last year
- CTFs solve scripts☆20Jan 9, 2026Updated 3 months ago
- TCP1P CTF 2023 Challenges☆42Oct 18, 2023Updated 2 years ago
- The First Open Source Bug Bounty Platform☆99Feb 5, 2026Updated 2 months ago
- TCP1P CTF writeup☆32May 23, 2023Updated 2 years ago
- My WriteUps for HackTheBox CTFs, Machines, and Sherlocks.☆177Feb 10, 2026Updated 2 months ago
- This is a mini repository of all CTF Jeopardy challenges from Day 2 and Day 3 of LKSN 2022. All the participants are high-schoolers and v…☆20Oct 31, 2022Updated 3 years ago
- CVE-2023-40028 affects Ghost, an open source content management system, where versions prior to 5.59.1 allow authenticated users to uploa…☆13Jan 7, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- NixOS configurations☆10Nov 11, 2024Updated last year
- EVE Virtual Environment - A management toolkit for libvirt-based virtualization servers.☆11Mar 10, 2025Updated last year
- The setup being used for mobile exploitation in the TCP1P CTF 2023☆13Nov 17, 2023Updated 2 years ago
- Learn asm programming journey with code and path learn☆27Jul 18, 2022Updated 3 years ago
- ☆14Jul 1, 2025Updated 9 months ago
- Kumpulan writeup dari lomba lomba CTF dan juga soalnya (kalau ada)☆13May 2, 2023Updated 2 years ago
- This is a curated list of mobile based CTFs, write-ups and vulnerable apps. Most of them are android based due to the popularity of the p…☆33Nov 21, 2024Updated last year
- ☆50Dec 4, 2023Updated 2 years ago
- Train your aim to destroy your enemy heads. Built with HTML, CSS, Vanilla JS☆11May 14, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A simple and classic Sudoku Game build in Android Studio with Kotlin for Android Users.☆17Feb 16, 2023Updated 3 years ago
- Frida script to dump native libraries from running process on Android, inspired by frida_dump☆14Aug 16, 2023Updated 2 years ago
- digital signature with SHA256withRSA in Java☆10Jul 15, 2017Updated 8 years ago
- My personal Wayland Desktop Shell☆36Nov 28, 2025Updated 4 months ago
- Pler - Domain Probe and Cloudflare Filter Tool. Pler is a simple yet powerful Python script to check whether a domain is using Cloudflare…☆22Aug 12, 2025Updated 7 months ago
- ☆10Apr 13, 2022Updated 3 years ago
- LimeSurvey Authenticated RCE☆24Jul 16, 2023Updated 2 years ago
- A fast and efficient subdomain hijacking scanner that checks for takeover vulnerabilities by matching HTTP response bodies against predef…☆29Dec 21, 2025Updated 3 months ago
- Python tool to parse and decrypt files quarantined by windows defender☆13Feb 25, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Implementation of known practical attack on some AES variant☆16Apr 3, 2024Updated 2 years ago
- Preparation of Attack & Defense CTF for iHack 2022☆16Nov 28, 2023Updated 2 years ago
- AI-Driven Breach and Attack Simulation Tool (Initial Proof of Concept for AI Pentest Copilot)☆26Jan 6, 2025Updated last year
- CTF Writeups☆184Dec 25, 2024Updated last year
- CVE-2025-6218 is a directory traversal vulnerability in WinRAR that allows an attacker to place files outside the intended extraction dir…☆16Jul 10, 2025Updated 9 months ago
- Simple bot visitor service for XSS challenges in CTF☆11Nov 9, 2022Updated 3 years ago
- A Ghidra script to aid reverse engineering of Android native (.so) libraries, by identifying dynamically registered functions within the …☆16Feb 27, 2024Updated 2 years ago