[QRS'22] TokenAuditor: Detecting Manipulation Risk in Token Smart Contract by Fuzzing
☆16Aug 24, 2023Updated 2 years ago
Alternatives and similar repositories for TokenAuditor
Users that are interested in TokenAuditor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆45Aug 9, 2023Updated 2 years ago
- Web app tool for helping compose advance search operators (aka Google dorking AKA boolean searches) for a variety of search engines☆35May 9, 2023Updated 2 years ago
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆22Jun 11, 2022Updated 3 years ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆53Jul 25, 2023Updated 2 years ago
- udpy_proto_scanner is a Python script which discovers UDP services by sending triggers to a list of hosts☆46Aug 1, 2023Updated 2 years ago
- hacking tools☆14Jan 29, 2023Updated 3 years ago
- WebDirScan is a tool for brute-forcing URIs (directories and files) on web servers by taking input directory to scan for files & director…☆11Mar 31, 2023Updated 2 years ago
- Global Dollar stablecoin smart contract repo☆16Mar 6, 2026Updated 2 weeks ago
- ☆22Jul 15, 2023Updated 2 years ago
- Hacking tool for enumeration and automated attacking. Port Scanner, Automatic SSH brute, DNS queries, IP and phonenumber geolocation☆14May 25, 2023Updated 2 years ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Jul 22, 2023Updated 2 years ago
- ☆19Mar 4, 2023Updated 3 years ago
- ProxyChecker Made in NodeJS☆37Mar 15, 2022Updated 4 years ago
- SidePeek.js is a curated set of JavaScript payloads for browser-based recon. Run them in DevTools or as bookmarklets to uncover hidden AP…☆21May 13, 2025Updated 10 months ago
- Proof of Concept for CVE-2023-23397 in Python☆25Mar 21, 2023Updated 3 years ago
- A small and portable Windows C library for sandbox detection☆36Oct 2, 2023Updated 2 years ago
- PoC for CVE-2023-20126☆24Jun 20, 2023Updated 2 years ago
- Automate Blind SQL Injection with Python.☆23Aug 20, 2022Updated 3 years ago
- ECC Public Key Cryptography☆37Oct 29, 2023Updated 2 years ago
- ☆31Mar 21, 2023Updated 3 years ago
- Generating Questions and Distractors automatically from Multimedia. Undergraduate Thesis work.☆22Feb 7, 2016Updated 10 years ago
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆35Oct 31, 2023Updated 2 years ago
- Capture screenshots of onion services on an onion service.☆73Jun 11, 2024Updated last year
- Use setupTermuxArch.sh 📲 to install Arch Linux in Termux on Android, Chromebook and Fire OS. This setup script will attempt to set Arch …☆20Jan 29, 2018Updated 8 years ago
- Efficient and advanced man in the middle framework☆23May 18, 2020Updated 5 years ago
- in-process powershell runner for BRC4☆48Oct 31, 2023Updated 2 years ago
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆27Sep 15, 2023Updated 2 years ago
- StarkNet smart contract fuzzer☆81Jul 8, 2022Updated 3 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- A Burp Suite extension for finding DNS vulnerabilities in web applications!☆91Sep 12, 2023Updated 2 years ago
- Modules for my C2 course students to use for their own projects.☆73Jun 13, 2023Updated 2 years ago
- Code from process of reversing Sysinternals Suite for educational purposes, with videos to associate them☆48Aug 23, 2023Updated 2 years ago
- This is a simple Go web server that allows users to upload files and view a list of the uploaded files. The server can be run locally or …☆57Mar 17, 2026Updated last week
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146May 31, 2024Updated last year
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- ☆12Dec 7, 2024Updated last year
- It provides configurable shortcuts to help make the pre-qual/testing process more efficient.☆11Nov 19, 2022Updated 3 years ago
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆31Jun 19, 2023Updated 2 years ago