Blockchain Attack Vectors & Vulnerabilities to Smart Contracts
☆35Dec 27, 2022Updated 3 years ago
Alternatives and similar repositories for Blockchain-Attack-Vectors
Users that are interested in Blockchain-Attack-Vectors are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Hacking and Exploiting Smart Contracts with Python Course Files☆25May 12, 2023Updated 2 years ago
- PoC of BitcoinCore Denial-Of-Service and DoubleSpending☆10Nov 12, 2018Updated 7 years ago
- FOR BTC☆13Mar 28, 2022Updated 3 years ago
- Examples of attacks on Ethereum smart contracts such as reentrancy, integer overflow, integer underflow and DoS with revert.☆15Sep 1, 2021Updated 4 years ago
- One weak transaction in ECDSA on the Bitcoin blockchain and with the help of Lattice Attack we received a Private Key to BTC coins☆31Dec 7, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Go Binance Bot run trades automatically and send notification to slack☆18Aug 30, 2023Updated 2 years ago
- New Version Hack script For mining ESCOIN free☆10Apr 25, 2022Updated 3 years ago
- A collection of BlockChain Solidity Smart Contracts: Building, Security & Exploits. Also exploring Cryptography (RSA, ECC) from Scratch.☆23May 3, 2025Updated 10 months ago
- How to Convert Bitcoin-PUBKEY HEX Public Keys to Base58 Bitcoin Address and Check Balance for BTC Coins☆11Aug 26, 2022Updated 3 years ago
- We have compiled an exhaustive list of cryptocurrency exchange hacks [ 2011 – 2022 ] – you will be amazed at how much has been stolen ove…☆12Dec 7, 2022Updated 3 years ago
- btc hacking☆11Apr 15, 2022Updated 3 years ago
- A Flashloan Contract for the Binance Smart Chain. It also includes a Javascript Bot that tracks the price of tokens before initiating the…☆17Mar 8, 2022Updated 4 years ago
- Ethical hacking practices used to explore vulnerabilities in smart contracts, in order to enhance security measures against potential thr…☆27Jan 8, 2024Updated 2 years ago
- List of resources and links that are relevant☆18Jan 16, 2026Updated 2 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Tools for btc hacking☆14Feb 21, 2021Updated 5 years ago
- 🍭 Web Application Vulnerability Scanner 🍭☆17May 21, 2022Updated 3 years ago
- In this article, we will implement a Twist Attack with an example and show how, using certain points on the secp256k1 elliptic curve, we …☆15Jan 22, 2023Updated 3 years ago
- Find all hostnames related to a given domain. Helpful during VA/PT work.☆16May 1, 2022Updated 3 years ago
- Foundry is a blazing fast, portable and modular toolkit for Ethereum application development written in Rust.☆48Oct 25, 2024Updated last year
- Practical example of the Reentrancy attack and how to protect against it☆49May 3, 2022Updated 3 years ago
- Implement Frey-Rück Attack to get the secret key “K” (NONCE) / Critical vulnerability in the Bitcoin☆13Dec 7, 2022Updated 3 years ago
- Search for private keys to receive Bitcoins using own algorithm "Bloom filter".☆36Mar 20, 2025Updated last year
- A Rust library along with a Win32 GUI application to determine the driver load order of a Windows system (cf. https://colinfinck.de/posts…☆13Jan 26, 2025Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Blockchain based contracting/tendering system☆13Feb 12, 2024Updated 2 years ago
- Public repository of 2026 crackmes.one CTF RE challenge☆28Mar 10, 2026Updated 2 weeks ago
- ☆10Mar 25, 2022Updated 4 years ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆23May 1, 2022Updated 3 years ago
- A food ordering website for restaurant and café for dine-in and takeaway☆17Jun 29, 2023Updated 2 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆13Aug 22, 2021Updated 4 years ago
- Elliptic curve tools, ECDSA, and ECDSA attacks.☆10Oct 29, 2019Updated 6 years ago
- An inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.☆13Jan 5, 2021Updated 5 years ago
- Raw transaction decoder for BNB, BTC☆10Aug 15, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A curated list of awesome blockchain security resources☆33Dec 15, 2023Updated 2 years ago
- Minimalistic Keyboard Driven Browser 🌐🎀☆14May 21, 2025Updated 10 months ago
- ☆10Aug 6, 2018Updated 7 years ago
- Recon(Amass, Naabu, Nuclei) workflow with Github Actions☆17Nov 12, 2024Updated last year
- Given one or more Bitcoin addresses with private keys, generates a TeX file suitable for printing and putting into cold storage.☆22May 25, 2024Updated last year
- Etherscan label scraper + API☆10Mar 16, 2023Updated 3 years ago
- Recover Monero address using the private spend key☆12Jan 31, 2017Updated 9 years ago