demining / Blockchain-Attack-VectorsLinks
Blockchain Attack Vectors & Vulnerabilities to Smart Contracts
☆34Updated 2 years ago
Alternatives and similar repositories for Blockchain-Attack-Vectors
Users that are interested in Blockchain-Attack-Vectors are comparing it to the libraries listed below
Sorting:
- Ethical hacking practices used to explore vulnerabilities in smart contracts, in order to enhance security measures against potential thr…☆24Updated last year
- This bot can be used to auto withdraw balance.☆14Updated 3 years ago
- Crypto Burner Bot is a powerful utility designed to safeguard compromised wallet addresses by automatically burning any incoming ETH or B…☆39Updated 2 years ago
- Scripts used in Blockchain Exploitation Blog☆41Updated last year
- This repository implements a Python function that recovers the private key from two different signatures that use the same random nonce d…☆105Updated 3 weeks ago
- 👾 my notes on decentralized protocols (e.g., oracles, bridges, honeypots, cryptography, decompilers, static analysis, bounties)☆270Updated 2 weeks ago
- Here we collect and discuss for Smart contract security & Blockchain researches and tools - contributions are welcome.☆95Updated 2 years ago
- A curated list of blockchain security Capture the Flag (CTF) competitions☆15Updated 4 years ago
- Static solidity smart contracts scanner written in Python☆24Updated last year
- This repository contains resources to learn blockchain technologies and blockchain hacking.☆16Updated 3 years ago
- ☆112Updated 3 years ago
- Bitcoin Randstorm Exploit - Very Fast Private Key and Address Generator☆76Updated last year
- Store your crypto wallet seed phrase securely & publicly in a tattoo☆22Updated 4 months ago
- Rapid Smart Contract Crawler☆205Updated last year
- A tool to visually generate a private key and address with automatic balance and activity check across several EVM-compatible blockchains☆46Updated 4 months ago
- OWASP Smart Contract Top 10☆62Updated this week
- Sweep your wallet of ETH, erc20 & erc721 tokens.☆30Updated 3 years ago
- Collection of CTFs for Fun and Interviewing Applicants☆151Updated 10 months ago
- bitdrain - remote p2p bandwidth/cpu overage attack against bitcoin, dogecoin, etc.☆38Updated last year
- We have compiled an exhaustive list of cryptocurrency exchange hacks [ 2011 – 2022 ] – you will be amazed at how much has been stolen ove…☆12Updated 3 years ago
- ☆116Updated 2 years ago
- A collection of BlockChain Solidity Smart Contracts: Building, Security & Exploits. Also exploring Cryptography (RSA, ECC) from Scratch.☆22Updated 7 months ago
- In this repository, I try to perform a mainnet fork and then simulate popular smart contract exploits on various DEFI Protocols using Har…☆33Updated 3 years ago
- This repo contains anti-hack checklists, which will help projects to build and develop secure DeFi applications. If you find anything mis…☆32Updated 3 years ago
- Vulnerable-by-design solidity protocol to help Web3 security enthusiasts practice their skills in an environment closer to real live.☆147Updated 6 months ago
- Learn smart contract security by hacking popular smart contract systems.☆97Updated 7 years ago
- Tool to hack a vanity address generated with Profanity☆141Updated last year
- My Blockchain auditing service☆21Updated 5 months ago
- List of resources to learn smart contract hacking.☆241Updated 6 years ago
- A framework for assessing the security of L2s☆49Updated 2 years ago