demining / Blockchain-Attack-Vectors
Blockchain Attack Vectors & Vulnerabilities to Smart Contracts
☆26Updated 2 years ago
Alternatives and similar repositories for Blockchain-Attack-Vectors:
Users that are interested in Blockchain-Attack-Vectors are comparing it to the libraries listed below
- Ethical hacking practices used to explore vulnerabilities in smart contracts, in order to enhance security measures against potential thr…☆17Updated last year
- This repository implements a Python function that recovers the private key from two different signatures that use the same random nonce d…☆90Updated 3 months ago
- This repository contains resources to learn blockchain technologies and blockchain hacking.☆14Updated 2 years ago
- This bot can be used to auto withdraw balance.☆12Updated 3 years ago
- Scripts used in Blockchain Exploitation Blog☆41Updated 11 months ago
- ☆52Updated last year
- No api requried & faster than ever☆22Updated last year
- Crypto Burner Bot is a powerful utility designed to safeguard compromised wallet addresses by automatically burning any incoming ETH or B…☆34Updated last year
- A tool to visually generate a private key and address with automatic balance and activity check across several EVM-compatible blockchains☆42Updated 3 weeks ago
- My Blockchain auditing service☆22Updated 2 months ago
- ☆36Updated last year
- A curated list of blockchain security incidents including exchange hacks, DeFi compromises, blockchain attacks, and others.☆24Updated 3 years ago
- A tool for checking BigSpender vulnerability in your Bitcoin wallet☆40Updated 4 years ago
- Here we collect and discuss for Smart contract security & Blockchain researches and tools - contributions are welcome.☆91Updated 2 years ago
- Smart Contract Security Practice | Lv1 Fallback Attack☆16Updated 3 years ago
- We have compiled an exhaustive list of cryptocurrency exchange hacks [ 2011 – 2022 ] – you will be amazed at how much has been stolen ove…☆12Updated 2 years ago
- Bitcoin Wallet Recovery via ECDSA Short Signatures☆11Updated 2 years ago
- bitdrain - remote p2p bandwidth/cpu overage attack against bitcoin, dogecoin, etc.☆39Updated 11 months ago
- Quickly open your favorite Web IDE to review the selected smart contract codebase☆30Updated last year
- ☆111Updated 2 years ago
- A framework for assessing the security of L2s☆46Updated last year
- In this repository, I try to perform a mainnet fork and then simulate popular smart contract exploits on various DEFI Protocols using Har…☆34Updated 2 years ago
- ☆22Updated 3 years ago
- OWASP Smart Contract Top 10☆47Updated 3 weeks ago
- Bitcoin Randstorm Exploit - Very Fast Private Key and Address Generator☆66Updated last year
- ECDSA nonce-reuse attack to recover a private key.☆49Updated 4 years ago
- ETH sweeper☆13Updated 2 years ago
- ☆110Updated last year
- Learn smart contract security by hacking popular smart contract systems.☆99Updated 6 years ago
- Blockchain Security Tools and Techniques - A Deep Dive to Virtual Machines, Vulnerability Assessments, Penetration Testing, Audit Tools e…☆32Updated 9 months ago