cybersec-code / watchyourbackLinks
Source code for Watch Your Back: Identifying Cybercrime Financial Relationships in Bitcoin through Back-and-Forth Exploration
☆12Updated last year
Alternatives and similar repositories for watchyourback
Users that are interested in watchyourback are comparing it to the libraries listed below
Sorting:
- ☆21Updated last year
- ☆31Updated 5 years ago
- ☆15Updated 3 years ago
- This repository contains code for BABD, as detailed in our paper published in IEEE TIFS☆30Updated 11 months ago
- Profiling and Deanonymizing Ethereum Users☆75Updated 4 years ago
- ☆10Updated 7 years ago
- MSc Project☆36Updated 6 years ago
- A collection of tools to measure and analyze frontrunning on Ethereum (USENIX 2021).☆33Updated 3 years ago
- ☆11Updated last year
- Datasets used in the paper "Labeled Transactions-based Dataset of Ethereum Network"☆20Updated 8 months ago
- ☆16Updated 4 years ago
- Dynamic graph of Ethereum transactions using Web3.js subscribe☆38Updated 5 years ago
- Extracting and Exploring Blockchain Data from Ethereum☆92Updated last month
- ☆57Updated 7 years ago
- A tool that detects honeypots in Ethereum smart contracts (USENIX 2019).☆102Updated 2 years ago
- A toolkit for blockchain data collection☆177Updated last week
- Xscope: Hunting for Cross-Chain Bridge Attacks☆15Updated 3 years ago
- Clustering of pseudoanonymous bitcoin addresses into related entities using structure of the bitcoin transaction graph and de-anonymizati…☆17Updated 8 years ago
- This repository contains the RAW results of the vulnerability analysis of 9 tools on 47,587 smart contracts. These results are presented …☆78Updated 5 years ago
- 📃 A public dataset of crypto addresses labeled☆241Updated last month
- Code for the paper "A Data Science Approach for Honeypot Detection in Ethereum"☆34Updated 2 years ago
- A Tool for clone detection and bug detection in smart contracts☆106Updated 2 years ago
- Python Data Science and Machine Learning Library for the Ethereum and ERC-20 Blockchain☆140Updated 3 years ago
- Keep track of all current ethereum scams in a large database☆172Updated 3 years ago
- Re-entrancy attack patterns from our paper "Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks"☆115Updated 6 years ago
- Web3 threat related labelled datasets for data analysis and machine learning developments.☆47Updated 2 years ago
- A distributed algorithm applied to the bitcoin blockchain that allows to create a new representation of the transaction - a clusterized g…☆10Updated 6 years ago
- Full label data dump of top EVM chains in JSON/CSV.☆280Updated 2 years ago
- Anonymity research tools for Tornado Cash. Contains deposit reuse clustering and TCash-specific reveals. Whitepaper: https://arxiv.org/…☆131Updated last year
- ☆25Updated last year