Blockchain Attack Vectors & Vulnerabilities to Smart Contracts
☆36Dec 27, 2022Updated 3 years ago
Alternatives and similar repositories for Blockchain-Attack-Vectors
Users that are interested in Blockchain-Attack-Vectors are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Blockchain Attack Simulator (BCASim) is an Open Source Blockchain Simulator for Attack Analysis☆17Dec 21, 2025Updated 3 months ago
- Hacking and Exploiting Smart Contracts with Python Course Files☆25May 12, 2023Updated 2 years ago
- PoC of BitcoinCore Denial-Of-Service and DoubleSpending☆10Nov 12, 2018Updated 7 years ago
- Bitcoin Wallet Recovery via ECDSA Short Signatures☆11Dec 7, 2022Updated 3 years ago
- «MrRobotQR» is an open source script that automates the process from entering a search keyword to deriving the private key of a Bitcoin …☆14Dec 7, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- FOR BTC☆13Mar 28, 2022Updated 4 years ago
- Examples of attacks on Ethereum smart contracts such as reentrancy, integer overflow, integer underflow and DoS with revert.☆15Sep 1, 2021Updated 4 years ago
- One weak transaction in ECDSA on the Bitcoin blockchain and with the help of Lattice Attack we received a Private Key to BTC coins☆31Dec 7, 2022Updated 3 years ago
- Go Binance Bot run trades automatically and send notification to slack☆18Aug 30, 2023Updated 2 years ago
- Bricks is a sandbox and instruction manual collection for building smart contract exploits for Ethereum blockchains, designed to help dev…☆28Jun 22, 2020Updated 5 years ago
- A collection of BlockChain Solidity Smart Contracts: Building, Security & Exploits. Also exploring Cryptography (RSA, ECC) from Scratch.☆23May 3, 2025Updated 11 months ago
- How to Convert Bitcoin-PUBKEY HEX Public Keys to Base58 Bitcoin Address and Check Balance for BTC Coins☆11Aug 26, 2022Updated 3 years ago
- A simple GUI to broadcast bitcoin transactions to the network.☆13Aug 16, 2025Updated 8 months ago
- btc hacking☆12Apr 15, 2022Updated 4 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- MetaX - Advanced XSS Vulnerability Detector☆15Dec 30, 2025Updated 3 months ago
- A Flashloan Contract for the Binance Smart Chain. It also includes a Javascript Bot that tracks the price of tokens before initiating the…☆17Mar 8, 2022Updated 4 years ago
- Ethical hacking practices used to explore vulnerabilities in smart contracts, in order to enhance security measures against potential thr…☆27Jan 8, 2024Updated 2 years ago
- List of resources and links that are relevant☆18Jan 16, 2026Updated 2 months ago
- Tools for btc hacking☆15Feb 21, 2021Updated 5 years ago
- In this article, we will implement a Twist Attack with an example and show how, using certain points on the secp256k1 elliptic curve, we …☆15Jan 22, 2023Updated 3 years ago
- Find all hostnames related to a given domain. Helpful during VA/PT work.☆16May 1, 2022Updated 3 years ago
- Foundry is a blazing fast, portable and modular toolkit for Ethereum application development written in Rust.☆47Oct 25, 2024Updated last year
- Practical example of the Reentrancy attack and how to protect against it☆49May 3, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Implement Frey-Rück Attack to get the secret key “K” (NONCE) / Critical vulnerability in the Bitcoin☆13Dec 7, 2022Updated 3 years ago
- darknet crawler to map links☆10Apr 15, 2020Updated 6 years ago
- Search for private keys to receive Bitcoins using own algorithm "Bloom filter".☆36Mar 20, 2025Updated last year
- The setup being used for mobile exploitation in the TCP1P CTF 2023☆13Nov 17, 2023Updated 2 years ago
- Command generator for pentesting tools☆17Dec 2, 2024Updated last year
- Python Script to Parse Phone # and E-mails from Websites☆10Mar 23, 2022Updated 4 years ago
- Google Tink's critical Ed25519 bug related to Java "final" keyword☆11Apr 5, 2020Updated 6 years ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆23May 1, 2022Updated 3 years ago
- ETH, BSC, Polygon compatible. (May require changes in the code and the info of DEXs accordingly.)☆13Jul 11, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆13Aug 22, 2021Updated 4 years ago
- A React Based Kubernetes YAML Manifest Sanity Checker☆11Mar 3, 2025Updated last year
- Elliptic curve tools, ECDSA, and ECDSA attacks.☆10Oct 29, 2019Updated 6 years ago
- Repository of important ETH attacks, based on smart contract vulnerabilities.☆11Jan 19, 2022Updated 4 years ago
- AI web vulneraribilty scanner 🤖☆20Feb 22, 2024Updated 2 years ago
- A curated list of awesome blockchain security resources☆33Dec 15, 2023Updated 2 years ago
- Minimalistic Keyboard Driven Browser 🌐🎀☆14May 21, 2025Updated 10 months ago