cybersec-code / watchyourback
Source code for Watch Your Back: Identifying Cybercrime Financial Relationships in Bitcoin through Back-and-Forth Exploration
☆10Updated 7 months ago
Alternatives and similar repositories for watchyourback:
Users that are interested in watchyourback are comparing it to the libraries listed below
- ☆11Updated 10 months ago
- ☆29Updated 4 years ago
- Profiling and Deanonymizing Ethereum Users☆72Updated 3 years ago
- ☆15Updated 4 years ago
- Web3 threat related labelled datasets for data analysis and machine learning developments.☆44Updated 2 years ago
- A collection of tools to measure and analyze frontrunning on Ethereum (USENIX 2021).☆33Updated 2 years ago
- Scripts and public dataset for "Dissecting Ponzi schemes in Ethereum"☆28Updated 4 years ago
- ☆72Updated last month
- Extracting and Exploring Blockchain Data from Ethereum☆70Updated this week
- ☆62Updated 2 years ago
- Anonymity research tools for Tornado Cash. Contains deposit reuse clustering and TCash-specific reveals. Whitepaper: https://arxiv.org/…☆121Updated last year
- MSc Project☆35Updated 5 years ago
- A tool that detects honeypots in Ethereum smart contracts (USENIX 2019).☆102Updated 2 years ago
- ☆42Updated 3 months ago
- This repository contains the RAW results of the vulnerability analysis of 9 tools on 47,587 smart contracts. These results are presented …☆76Updated 4 years ago
- A Tool for clone detection and bug detection in smart contracts☆106Updated last year
- ☆58Updated 7 years ago
- EVM CFG recovery☆123Updated last year
- The Ghidra EVM Module (ghidra-evm) leverages Ghidra 9.1.2 to disassemble and analyze compiled Ethereum smart contracts. Ghidra-evm was pr…☆138Updated 3 years ago
- ☆13Updated 2 years ago
- Dynamic graph of Ethereum transactions using Web3.js subscribe☆38Updated 5 years ago
- Audit assist tool: Given a contract, find all subcontracts defined on it, calculate their sha-256 hash and look for exact matches☆39Updated 2 years ago
- This repository contains code for BABD, as detailed in our paper published in IEEE TIFS☆28Updated 2 months ago
- Tokens Blacklist for spam/airdrop tokens that are scamming users☆36Updated 10 months ago
- Smart Contract Vulnerability Detection Using Graph Neural Networks (IJCAI-20 Accepted)☆137Updated 2 years ago
- Empirical Analysis of EIP-1559: Transaction Fees, Waiting Time, and Consensus Security☆20Updated 2 years ago
- Datasets used in the paper "Labeled Transactions-based Dataset of Ethereum Network"☆14Updated 7 months ago
- Anomaly detection in the Ethereum network☆13Updated 3 years ago
- ☆12Updated last year
- A tool for exploring the solc abstract syntax tree☆39Updated last year