caomingpei / TokenAuditorLinks
[QRS'22] TokenAuditor: Detecting Manipulation Risk in Token Smart Contract by Fuzzing
☆16Updated 2 years ago
Alternatives and similar repositories for TokenAuditor
Users that are interested in TokenAuditor are comparing it to the libraries listed below
Sorting:
- Only for educational purposes☆12Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆22Updated 3 years ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Updated 2 years ago
- MacroExploit use in excel sheet☆20Updated 2 years ago
- Automate Blind SQL Injection with Python.☆22Updated 3 years ago
- ☆14Updated 10 months ago
- A C2 framework for all your God Complex. A fully functional and integrated Botnet for remote command execution through user friendly UI.☆45Updated 2 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Updated 2 years ago
- ☆13Updated 2 years ago
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆44Updated 2 years ago
- WebDirScan is a tool for brute-forcing URIs (directories and files) on web servers by taking input directory to scan for files & director…☆11Updated 2 years ago
- Monitor your target continuously for new subdomains!☆25Updated 2 years ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Updated 2 years ago
- Automate All Pivoting System Enumeration with this Bash Script☆13Updated 3 years ago
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 3 years ago
- An automated e-mail OSINT tool☆23Updated 3 years ago
- ☆19Updated 2 years ago
- Widget Options – The #1 WordPress Widget & Block Control Plugin <= 4.0.7 - Authenticated (Contributor+) Remote Code Execution☆13Updated last year
- This is a working variant of the Mirai IOT botnet☆15Updated 3 years ago
- Tools used for Pentesting☆22Updated 2 years ago
- ☆17Updated last year
- my own 2fa bypass methodolgy☆27Updated 2 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 3 years ago
- CVE-2023-28121 - WooCommerce Payments < 5.6.2 - Unauthenticated Privilege Escalation [ Mass Add Admin User ]☆11Updated 2 years ago
- It's a handy tool to help you analyze malware. You can use this tool to query your malware samples using different hashes or find all oth…☆20Updated 6 months ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated last year
- ProxyChecker Made in NodeJS☆37Updated 3 years ago
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Updated 2 years ago
- Burp extension used to snip any header from all the requests.☆23Updated 2 years ago