celiakwan / ethereum-attack-examples
Examples of attacks on Ethereum smart contracts such as reentrancy, integer overflow, integer underflow and DoS with revert.
☆15Updated 3 years ago
Alternatives and similar repositories for ethereum-attack-examples:
Users that are interested in ethereum-attack-examples are comparing it to the libraries listed below
- A phishing website to demonstrate how a hacker can steal your ERC-20 tokens with the approve and transferFrom functions, and the risk of …☆42Updated 3 years ago
- ☆26Updated 3 years ago
- This bot can be used to auto withdraw balance.☆12Updated 2 years ago
- The Etherum RPC Steal Toolset and honeypot .以太坊"偷渡"漏洞利用和蜜罐工具集.☆38Updated 6 years ago
- Blockchain Attack Vectors & Vulnerabilities to Smart Contracts☆24Updated 2 years ago
- Binance Smart Chain (BSC), Ethereum (ETH), Polygon (MATIC), Avalanche (AVAX), Polygon (MATIC), Fantom (FTM), Pinksale, Moonforce sniper b…☆18Updated last year
- brownie port of damn vulnerable defi☆16Updated 2 years ago
- This bot will bet the specified amount of BNB to the side with more money at the last N seconds of the bet countdown.☆28Updated 2 years ago
- ☆13Updated 5 years ago
- ☆13Updated 2 years ago
- 轻量化端口扫描工具☆15Updated 5 years ago
- ☆11Updated 2 years ago
- Ethereum transaction decoder (community version).☆14Updated 3 years ago
- UI interface for Pizza Finance☆14Updated 3 years ago
- 51Pwn Platform,为黑客而生的大数据搜索引擎,Big data search engine born for hackers☆29Updated 3 months ago
- SQL injector vulnerability scanner and exploiter along with sqli dork scanner☆13Updated 3 years ago
- 本脚本旨在生成各类畸形URL链接,进行探测使用的payload,尝试绕过服务端ssrf限制。☆29Updated 6 years ago
- Reproduce DeFi hack incidents and collections of security-related issues.☆10Updated 2 years ago
- BlockChain Security☆26Updated 3 years ago
- Securing the Web3.0☆15Updated 2 years ago
- CVE-2022-26134 - Pre-Auth Remote Code Execution via OGNL Injection☆4Updated 2 years ago
- evil jar attack technical post-mortem☆140Updated 4 years ago
- This article aims to provide auditors with a baseline checklist for auditing account abstraction wallets implemented based on the EIP4337…☆11Updated 6 months ago
- Simple simulation of FlashLoan system☆10Updated 3 years ago
- Simple DNS log Server,easy to ACME DNS challenge☆21Updated last year
- How to Exploit Blockchain Public Chain and Smart Contract Vulnerability☆8Updated 5 years ago
- A tool to visually generate a private key and address with automatic balance and activity check across several EVM-compatible blockchains☆40Updated 11 months ago
- 在学习信息安全的过程中收集的文件与信息。☆22Updated 7 years ago
- 区块链安全学习资料汇总☆26Updated 3 years ago
- ☆19Updated 9 months ago