Xscope: Hunting for Cross-Chain Bridge Attacks
☆16Aug 1, 2022Updated 3 years ago
Alternatives and similar repositories for Cross-Chain-Attacks
Users that are interested in Cross-Chain-Attacks are comparing it to the libraries listed below
Sorting:
- Chinese translation of Cosmos IBC spec: https://github.com/cosmos/ibc/tree/main/spec☆11Aug 8, 2022Updated 3 years ago
- ☆30Dec 28, 2024Updated last year
- Data pertaining to the Nomad Bridge Hack☆24Dec 20, 2022Updated 3 years ago
- Data and code for the IEEE S&P'22 paper SAILFISH: Vetting Smart Contract State-Inconsistency Bugs in Seconds☆60Jun 5, 2022Updated 3 years ago
- A tool that detects honeypots in Ethereum smart contracts (USENIX 2019).☆102Mar 7, 2023Updated 2 years ago
- ☆31Dec 11, 2022Updated 3 years ago
- Disabled the Force Stop button under Manage Application in Android☆12Dec 27, 2013Updated 12 years ago
- ANOMULY is a general, unsupervised edge anomaly detection framework for multiplex dynamic networks.☆11May 19, 2023Updated 2 years ago
- This code is to implement the model-free control algorithm as introduced in the paper Model-free control by Michel Fliess and Cedric Join…☆13Nov 29, 2017Updated 8 years ago
- ☆12Jan 15, 2019Updated 7 years ago
- ☆11Jul 10, 2022Updated 3 years ago
- Sandbox for Hyperledger Projects Performance research usage☆12Nov 27, 2023Updated 2 years ago
- Ilya Sutskever 推荐的30篇Deep learning 必读论文 (中英文对照翻译版)☆13Dec 18, 2024Updated last year
- Linklyze 分布式短链系统 URL Shortener☆13Oct 4, 2023Updated 2 years ago
- Panes zooming in tmux☆37Jun 6, 2021Updated 4 years ago
- [PHP][Python] Root Exploiter – No Back-Connect☆10Aug 27, 2021Updated 4 years ago
- Airport Gate Scheduling System is an automatic assignment of Landing time and Take-off time for each of the airplanes based on various co…☆10Nov 29, 2019Updated 6 years ago
- ☆13Feb 11, 2024Updated 2 years ago
- The dataset in the paper "Detecting '0-Day' Vulnerability: An Empirical Study of Secret Security Patch in OSS", which appears in the 2019…☆13Aug 9, 2023Updated 2 years ago
- ☆10Jul 24, 2018Updated 7 years ago
- Blockchain-based PKI enhancement☆11May 7, 2018Updated 7 years ago
- Ecg experiment, including Fourier transform, wavelet transform, wavelet decomposition and LSTM feature extraction. Emotion classification…☆11Jul 17, 2020Updated 5 years ago
- Ranking LLM-Generated Loop Invariants for Program Verification.☆12Aug 20, 2024Updated last year
- ☆49Jan 14, 2025Updated last year
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆49Aug 9, 2023Updated 2 years ago
- Threshold signature library across multiple platforms☆45Feb 19, 2023Updated 3 years ago
- PDiff: Semantic-based Patch Presence Testing for Downstream Kernels☆14Nov 8, 2020Updated 5 years ago
- ☆11Apr 2, 2024Updated last year
- ☆11Sep 6, 2023Updated 2 years ago
- Exploring what's possible with the ChatGPT Code Interpreter and how to use it effectively☆11Jul 22, 2023Updated 2 years ago
- JavaScript tutorial for Zero-Knowledge Proofs using SnarkJS and Circom☆12Jan 7, 2023Updated 3 years ago
- 学习笔记或教程项目☆11Oct 11, 2018Updated 7 years ago
- Introduction to building on & interacting with the Solana blockchain☆11May 16, 2023Updated 2 years ago
- 这个项目存放了我编写的所有关于监控设备的脚本,并使用flask搭建WEB 展示扫描的结果☆10Feb 21, 2017Updated 9 years ago
- ☆13Feb 14, 2025Updated last year
- Characterizing Transaction-Reverting Statements in Ethereum Smart Contracts.☆11Sep 1, 2021Updated 4 years ago
- The "DIstributed Analytical BLOckchain" Benchmark Framework. (Diablo). Measures blockchains with a focus on real-world applications and w…☆13Jan 12, 2024Updated 2 years ago
- PVSS & Scrape in rust☆11Aug 14, 2025Updated 6 months ago
- This repository contains information related to the Root Cause Mapping Working Group and its activities. CVE Numbering Authority (CNA) re…☆16Jan 29, 2025Updated last year