Blockchain Attack Vectors & Vulnerabilities to Smart Contracts
☆35Dec 27, 2022Updated 3 years ago
Alternatives and similar repositories for Blockchain-Attack-Vectors
Users that are interested in Blockchain-Attack-Vectors are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Bitcoin Wallet Recovery via ECDSA Short Signatures☆11Dec 7, 2022Updated 3 years ago
- FOR BTC☆12Mar 28, 2022Updated 4 years ago
- Examples of attacks on Ethereum smart contracts such as reentrancy, integer overflow, integer underflow and DoS with revert.☆15Sep 1, 2021Updated 4 years ago
- Terminal CryptoDeepTech for Google Colab☆30Jan 28, 2026Updated 3 months ago
- Go Binance Bot run trades automatically and send notification to slack☆18Aug 30, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- New Version Hack script For mining ESCOIN free☆10Apr 25, 2022Updated 4 years ago
- Bricks is a sandbox and instruction manual collection for building smart contract exploits for Ethereum blockchains, designed to help dev…☆28Jun 22, 2020Updated 5 years ago
- A collection of BlockChain Solidity Smart Contracts: Building, Security & Exploits. Also exploring Cryptography (RSA, ECC) from Scratch.☆23May 3, 2025Updated last year
- How to Convert Bitcoin-PUBKEY HEX Public Keys to Base58 Bitcoin Address and Check Balance for BTC Coins☆11Aug 26, 2022Updated 3 years ago
- btc hacking☆11Apr 15, 2022Updated 4 years ago
- A Flashloan Contract for the Binance Smart Chain. It also includes a Javascript Bot that tracks the price of tokens before initiating the…☆16Mar 8, 2022Updated 4 years ago
- Ethical hacking practices used to explore vulnerabilities in smart contracts, in order to enhance security measures against potential thr…☆26Jan 8, 2024Updated 2 years ago
- List of resources and links that are relevant☆18Jan 16, 2026Updated 3 months ago
- 🍭 Web Application Vulnerability Scanner 🍭☆16May 21, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- In this article, we will implement a Twist Attack with an example and show how, using certain points on the secp256k1 elliptic curve, we …☆15Jan 22, 2023Updated 3 years ago
- Find all hostnames related to a given domain. Helpful during VA/PT work.☆16May 1, 2022Updated 4 years ago
- Foundry is a blazing fast, portable and modular toolkit for Ethereum application development written in Rust.☆47Oct 25, 2024Updated last year
- Practical example of the Reentrancy attack and how to protect against it☆48May 3, 2022Updated 4 years ago
- Implement Frey-Rück Attack to get the secret key “K” (NONCE) / Critical vulnerability in the Bitcoin☆13Dec 7, 2022Updated 3 years ago
- Search for private keys to receive Bitcoins using own algorithm "Bloom filter".☆36Mar 20, 2025Updated last year
- solidity smart-contract CTFs and wargames solved for fun and profit☆14Mar 1, 2020Updated 6 years ago
- The setup being used for mobile exploitation in the TCP1P CTF 2023☆13Nov 17, 2023Updated 2 years ago
- Command generator for pentesting tools☆17Dec 2, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Python Script to Parse Phone # and E-mails from Websites☆10Mar 23, 2022Updated 4 years ago
- ☆10Mar 25, 2022Updated 4 years ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆23May 1, 2022Updated 4 years ago
- ETH, BSC, Polygon compatible. (May require changes in the code and the info of DEXs accordingly.)☆13Jul 11, 2022Updated 3 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆13Aug 22, 2021Updated 4 years ago
- Public repository of 2026 crackmes.one CTF RE challenge☆40Mar 10, 2026Updated last month
- Repository of important ETH attacks, based on smart contract vulnerabilities.☆11Jan 19, 2022Updated 4 years ago
- Raw transaction decoder for BNB, BTC☆10Aug 15, 2021Updated 4 years ago
- An inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.☆13Jan 5, 2021Updated 5 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Minimalistic Keyboard Driven Browser 🌐🎀☆14May 21, 2025Updated 11 months ago
- A curated list of awesome blockchain security resources☆33Dec 15, 2023Updated 2 years ago
- ☆10Aug 6, 2018Updated 7 years ago
- Recon(Amass, Naabu, Nuclei) workflow with Github Actions☆17Nov 12, 2024Updated last year
- Code for Smart Contract Vulnerabilities: Vulnerable Does Not Imply Exploited☆26Oct 31, 2020Updated 5 years ago
- ButKoin is an experimental decentralized secure cryptocurrency that is easy to mine devoid from 51% attack and it provide easy means of t…☆20Jan 22, 2023Updated 3 years ago
- Binance Hackathon: The Future Is Now - Introducing NETFLIX NFT from Team CenterPrime.☆10Feb 24, 2021Updated 5 years ago