Learn & Contribute on previously exploited vulnerabilities across several EVM projects.
☆19Jan 16, 2023Updated 3 years ago
Alternatives and similar repositories for learn-evm-attacks
Users that are interested in learn-evm-attacks are comparing it to the libraries listed below
Sorting:
- Interactions between developers and auditors☆11Jan 30, 2024Updated 2 years ago
- ☆14Nov 15, 2023Updated 2 years ago
- Readiness Assessment for CARE Endeavour☆59Feb 22, 2024Updated 2 years ago
- MoveBit Sampled Audit Reports☆51Oct 17, 2024Updated last year
- A curated list of blockchain security Capture the Flag (CTF) competitions☆92Sep 1, 2023Updated 2 years ago
- ☆37Apr 18, 2023Updated 2 years ago
- Framework-agnostic dependency injection that adapts to your favorite UI library☆46Apr 10, 2025Updated 10 months ago
- Port Invaders is an arcade-style educational game designed to help you learn and memorize common networking port numbers. Whether you're …☆17Sep 4, 2023Updated 2 years ago
- Information about Progress MoveIT CVE☆11Jun 16, 2023Updated 2 years ago
- Template for working with the ApeCoinStaking smart contract in Foundry☆10Dec 7, 2022Updated 3 years ago
- ☆14Updated this week
- ☆11Aug 31, 2023Updated 2 years ago
- ☆10Jul 1, 2024Updated last year
- Compound V2 Examples☆11Jan 20, 2023Updated 3 years ago
- ☆12Sep 22, 2023Updated 2 years ago
- Opens ports through a NAT with NAT-PMP, PCP, and UPnP☆11Mar 24, 2016Updated 9 years ago
- shellcode obfuscater and runner in golang☆11Aug 13, 2023Updated 2 years ago
- Solutions for Ethernaut CTF (https://ethernaut.openzeppelin.com) - Writeups at https://notonlyowner.com☆12May 9, 2021Updated 4 years ago
- ☆11Mar 8, 2024Updated last year
- This repository contains list of resources to aid your journey of mastering Ethereum Virtual Machine. If you find any resource missing, y…☆214Nov 17, 2023Updated 2 years ago
- ☆10Mar 22, 2023Updated 2 years ago
- Windows Network File System Remote exploit for CVE-2022-30136☆14Jul 11, 2023Updated 2 years ago
- Direct system calls by nim☆14Mar 15, 2022Updated 3 years ago
- A utility to fetch and display dns names from the SSL/TLS cert data☆16Aug 11, 2023Updated 2 years ago
- Cryptography notes☆57Mar 23, 2024Updated last year
- Process hunting Toolkit is toolkit capable of hunting down malicious processes on Windows☆14Jan 31, 2025Updated last year
- ☆12Aug 10, 2022Updated 3 years ago
- ☆17Oct 9, 2024Updated last year
- A hardware monitor built on top of Libre Hardware Monitor☆14Aug 17, 2023Updated 2 years ago
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- ☆15May 2, 2024Updated last year
- An easy to configure .zshrc with 256 color support, github status, program exit status, directory truncation, and sane defaults.☆10Feb 9, 2022Updated 4 years ago
- 🕵️ Check ERC20 token implementations on all chains.☆19Jan 6, 2024Updated 2 years ago
- ☆12Sep 17, 2020Updated 5 years ago
- ☆15Updated this week
- A powerful tool to scan CRLF vulnerability written in Python☆15Oct 31, 2023Updated 2 years ago
- ☆14Nov 15, 2023Updated 2 years ago
- Declare and keep up a rogue default-gateway in Cisco's HSRP default configuration☆16May 26, 2017Updated 8 years ago
- Public exploits☆16May 28, 2018Updated 7 years ago