demining / Blockchain-Attack-VectorsLinks
Blockchain Attack Vectors & Vulnerabilities to Smart Contracts
☆35Updated 3 years ago
Alternatives and similar repositories for Blockchain-Attack-Vectors
Users that are interested in Blockchain-Attack-Vectors are comparing it to the libraries listed below
Sorting:
- Ethical hacking practices used to explore vulnerabilities in smart contracts, in order to enhance security measures against potential thr…☆27Updated 2 years ago
- Static solidity smart contracts scanner written in Python☆24Updated last year
- Here we collect and discuss for Smart contract security & Blockchain researches and tools - contributions are welcome.☆95Updated 2 years ago
- 👾 my notes on decentralized protocols (e.g., oracles, bridges, honeypots, cryptography, decompilers, static analysis, bounties)☆272Updated 2 months ago
- Scripts used in Blockchain Exploitation Blog☆42Updated last year
- OWASP Smart Contract Top 10☆66Updated this week
- Crypto Burner Bot is a powerful utility designed to safeguard compromised wallet addresses by automatically burning any incoming ETH or B…☆39Updated 2 years ago
- This repository contains resources to learn blockchain technologies and blockchain hacking.☆16Updated 3 years ago
- ☆112Updated 3 years ago
- This bot can be used to auto withdraw balance.☆15Updated 3 years ago
- My Blockchain auditing service☆21Updated 7 months ago
- Vulnerable-by-design solidity protocol to help Web3 security enthusiasts practice their skills in an environment closer to real live.☆147Updated 8 months ago
- ☆116Updated 2 years ago
- Learn smart contract security by hacking popular smart contract systems.☆97Updated 7 years ago
- Collection of CTFs for Fun and Interviewing Applicants☆152Updated last year
- List of resources to learn smart contract hacking.☆242Updated 6 years ago
- Bitcoin Randstorm Exploit - Very Fast Private Key and Address Generator☆79Updated 2 years ago
- Sweep your wallet of ETH, erc20 & erc721 tokens.☆31Updated 3 years ago
- This repository implements a Python function that recovers the private key from two different signatures that use the same random nonce d…☆107Updated last month
- Rapid Smart Contract Crawler☆205Updated last year
- bitdrain - remote p2p bandwidth/cpu overage attack against bitcoin, dogecoin, etc.☆37Updated last year
- A compendium of smart contract auditing resources for beginners☆36Updated 2 years ago
- A curated list of blockchain security incidents including exchange hacks, DeFi compromises, blockchain attacks, and others.☆25Updated 4 years ago
- A collection of tutorials, CTFs, wargames, articles, and other resources for Smart Contract security.☆14Updated 3 years ago
- ☆46Updated last year
- Tool to hack a vanity address generated with Profanity☆141Updated last year
- ☆43Updated 3 years ago
- brownie port of damn vulnerable defi☆14Updated 4 years ago
- We have compiled an exhaustive list of cryptocurrency exchange hacks [ 2011 – 2022 ] – you will be amazed at how much has been stolen ove…☆12Updated 3 years ago
- Learn 101 is a challenge to keep the learning spirit going on and challenge myself to learn something daily for 101 days.☆30Updated 3 years ago