demining / Blockchain-Attack-VectorsLinks
Blockchain Attack Vectors & Vulnerabilities to Smart Contracts
☆35Updated 3 years ago
Alternatives and similar repositories for Blockchain-Attack-Vectors
Users that are interested in Blockchain-Attack-Vectors are comparing it to the libraries listed below
Sorting:
- Crypto Burner Bot is a powerful utility designed to safeguard compromised wallet addresses by automatically burning any incoming ETH or B…☆39Updated 2 years ago
- Ethical hacking practices used to explore vulnerabilities in smart contracts, in order to enhance security measures against potential thr…☆27Updated 2 years ago
- Store your crypto wallet seed phrase securely & publicly in a tattoo☆22Updated 6 months ago
- Scripts used in Blockchain Exploitation Blog☆42Updated last year
- 👾 my notes on decentralized protocols (e.g., oracles, bridges, honeypots, cryptography, decompilers, static analysis, bounties)☆272Updated 2 months ago
- This bot can be used to auto withdraw balance.☆15Updated 3 years ago
- Sweep your wallet of ETH, erc20 & erc721 tokens.☆31Updated 3 years ago
- Static solidity smart contracts scanner written in Python☆24Updated last year
- Here we collect and discuss for Smart contract security & Blockchain researches and tools - contributions are welcome.☆95Updated 2 years ago
- This repository contains resources to learn blockchain technologies and blockchain hacking.☆16Updated 3 years ago
- Bitcoin Randstorm Exploit - Very Fast Private Key and Address Generator☆79Updated 2 years ago
- A curated list of blockchain security incidents including exchange hacks, DeFi compromises, blockchain attacks, and others.☆25Updated 4 years ago
- ☆112Updated 3 years ago
- bitdrain - remote p2p bandwidth/cpu overage attack against bitcoin, dogecoin, etc.☆37Updated last year
- This repository implements a Python function that recovers the private key from two different signatures that use the same random nonce d…☆107Updated last month
- We have compiled an exhaustive list of cryptocurrency exchange hacks [ 2011 – 2022 ] – you will be amazed at how much has been stolen ove…☆12Updated 3 years ago
- Code to borrow as much { WETH, USDC, DAI, USDT } as you want from Aave and make an arbitrage transaction with Uniswap up to V3☆87Updated 8 months ago
- A curated list of blockchain security Capture the Flag (CTF) competitions☆15Updated 5 years ago
- ☆116Updated 2 years ago
- Collection of CTFs for Fun and Interviewing Applicants☆152Updated last year
- A tool to visually generate a private key and address with automatic balance and activity check across several EVM-compatible blockchains☆47Updated 6 months ago
- Rapid Smart Contract Crawler☆205Updated last year
- Vanitygen plus plus for VS2019 - ported for Microsoft Windows 10, VS2019 and NVIDIA CUDA SDK. It is a vanity address generator for ALC, B…☆51Updated 3 years ago
- ☆23Updated 4 years ago
- ECDSA nonce-reuse attack to recover a private key.☆50Updated 5 years ago
- Vulnerable-by-design solidity protocol to help Web3 security enthusiasts practice their skills in an environment closer to real live.☆147Updated 8 months ago
- A framework for assessing the security of L2s☆48Updated 2 years ago
- A tool for checking BigSpender vulnerability in your Bitcoin wallet☆38Updated 4 years ago
- Tool to hack a vanity address generated with Profanity☆141Updated last year
- My Blockchain auditing service☆21Updated 7 months ago