demining / Blockchain-Attack-VectorsLinks
Blockchain Attack Vectors & Vulnerabilities to Smart Contracts
☆26Updated 2 years ago
Alternatives and similar repositories for Blockchain-Attack-Vectors
Users that are interested in Blockchain-Attack-Vectors are comparing it to the libraries listed below
Sorting:
- Ethical hacking practices used to explore vulnerabilities in smart contracts, in order to enhance security measures against potential thr…☆17Updated last year
- Here we collect and discuss for Smart contract security & Blockchain researches and tools - contributions are welcome.☆91Updated 2 years ago
- This repository contains resources to learn blockchain technologies and blockchain hacking.☆14Updated 3 years ago
- This repository implements a Python function that recovers the private key from two different signatures that use the same random nonce d…☆90Updated last month
- This bot can be used to auto withdraw balance.☆12Updated 3 years ago
- ☆52Updated last year
- Scripts used in Blockchain Exploitation Blog☆41Updated last year
- ☆37Updated last year
- Store your crypto wallet seed phrase securely & publicly in a tattoo☆22Updated 3 years ago
- ☆110Updated last year
- We have compiled an exhaustive list of cryptocurrency exchange hacks [ 2011 – 2022 ] – you will be amazed at how much has been stolen ove…☆12Updated 2 years ago
- This repo contains anti-hack checklists, which will help projects to build and develop secure DeFi applications. If you find anything mis…☆32Updated 2 years ago
- brownie port of damn vulnerable defi☆16Updated 3 years ago
- ☆42Updated 2 years ago
- In this repository, I try to perform a mainnet fork and then simulate popular smart contract exploits on various DEFI Protocols using Har…☆33Updated 2 years ago
- My Blockchain auditing service☆22Updated last month
- ECDSA nonce-reuse attack to recover a private key.☆50Updated 4 years ago
- Static solidity smart contracts scanner written in Python☆22Updated 11 months ago
- A tool to visually generate a private key and address with automatic balance and activity check across several EVM-compatible blockchains☆43Updated 3 weeks ago
- Solutions and Walkthrough for Openzeppelin's Ethernaut CTF written in Solidity with the help of Foundry☆52Updated last year
- Rapid Smart Contract Crawler☆201Updated last year
- Learn smart contract security by hacking popular smart contract systems.☆100Updated 6 years ago
- Learn 101 is a challenge to keep the learning spirit going on and challenge myself to learn something daily for 101 days.☆30Updated 3 years ago
- All of my CTF(THM, HTB, pentesterlab, vulnhub etc.) wirte-ups & notes☆21Updated last year
- Code to borrow as much { WETH, USDC, DAI, USDT } as you want from Aave and make an arbitrage transaction.☆13Updated last month
- A framework for assessing the security of L2s☆47Updated last year
- ☆47Updated last week
- A curated list of blockchain security Capture the Flag (CTF) competitions☆15Updated 4 years ago
- Tool to hack a vanity address generated with Profanity☆139Updated last year
- Smart Contract Security Practice | Lv1 Fallback Attack☆16Updated 3 years ago