demining / Blockchain-Attack-VectorsLinks
Blockchain Attack Vectors & Vulnerabilities to Smart Contracts
☆27Updated 2 years ago
Alternatives and similar repositories for Blockchain-Attack-Vectors
Users that are interested in Blockchain-Attack-Vectors are comparing it to the libraries listed below
Sorting:
- Ethical hacking practices used to explore vulnerabilities in smart contracts, in order to enhance security measures against potential thr…☆18Updated last year
- Here we collect and discuss for Smart contract security & Blockchain researches and tools - contributions are welcome.☆91Updated 2 years ago
- Scripts used in Blockchain Exploitation Blog☆41Updated last year
- 👾 notes and resources on decentralized protocols (e.g. oracles, bridges, honeypots, cryptography, decompilers, static analysis, bug boun…☆266Updated 5 months ago
- Crypto Burner Bot is a powerful utility designed to safeguard compromised wallet addresses by automatically burning any incoming ETH or B…☆37Updated 2 years ago
- Store your crypto wallet seed phrase securely & publicly in a tattoo☆22Updated last week
- Code to borrow as much { WETH, USDC, DAI, USDT } as you want from Aave and make an arbitrage transaction with Uniswap up to V3☆71Updated 2 months ago
- Bitcoin Randstorm Exploit - Very Fast Private Key and Address Generator☆72Updated last year
- This bot can be used to auto withdraw balance.☆13Updated 3 years ago
- Code to borrow as much { WETH, USDC, DAI, USDT } as you want from Aave and make an arbitrage transaction.☆15Updated 2 months ago
- ☆111Updated last year
- Vanitygen plus plus for VS2019 - ported for Microsoft Windows 10, VS2019 and NVIDIA CUDA SDK. It is a vanity address generator for ALC, B…☆49Updated 3 years ago
- Sweep your wallet of ETH, erc20 & erc721 tokens.☆31Updated 2 years ago
- OWASP Smart Contract Top 10☆54Updated this week
- Tool to hack a vanity address generated with Profanity☆139Updated last year
- This repository implements a Python function that recovers the private key from two different signatures that use the same random nonce d…☆94Updated last month
- List of resources to learn smart contract hacking.☆240Updated 6 years ago
- ECDSA nonce-reuse attack to recover a private key.☆50Updated 4 years ago
- ☆113Updated 2 years ago
- My Blockchain auditing service☆21Updated last month
- A curated list of blockchain security Capture the Flag (CTF) competitions☆15Updated 4 years ago
- Collection of CTFs for Fun and Interviewing Applicants☆147Updated 6 months ago
- A tool to visually generate a private key and address with automatic balance and activity check across several EVM-compatible blockchains☆45Updated 2 weeks ago
- bitdrain - remote p2p bandwidth/cpu overage attack against bitcoin, dogecoin, etc.☆39Updated last year
- Learn smart contract security by hacking popular smart contract systems.☆100Updated 7 years ago
- ☆37Updated last year
- Static solidity smart contracts scanner written in Python☆22Updated last year
- Rapid Smart Contract Crawler☆203Updated last year
- ☆52Updated last year
- ☆24Updated 3 years ago